Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1014)
  • Article (317)
  • News (205)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 155 Next »

9%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
to query; for example: nslookup -server 10.0.0.11 You can also combine the two options, if necessary. If you start nslookup so that it does not use the locally configured DNS server for name resolution
9%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
to send their 20MB PowerPoint presentations by email. Moreover, the number of email users is still growing steadily, and the amount of data stored by all of a provider's users is growing proportionally
9%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
.SaveChanges() The logs are very verbose, so their size can quickly reach the default configured limit of 1MB if you have a large number of protected accounts. You can set the size immediately on enabling by adding
9%
Four rescue systems compared
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Stephen Coburn, fotolia.com
in three forms: Grml32 and Grml64, each about 350MB and intended for 32- and 64-bit systems, respectively, and Grml96, which combines both images, yet still fits on a CD. You will never have to download more
9%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
-flannel-ds-arm-vdprb 1/1 Running 3 26d kube-flannel-ds-arm-xnxqp 1/1 Running 0 26d kube-flannel-ds-arm-zsnpp 1/1 Running 4 34d kube-proxy-lknwh 1
9%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
is easy enough (superuser privileges are required): arp -s 192.168.90.55 00:0c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which
9%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
9%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
at a Linux machine that cost me US$ 0.10. (By the time I had stopped staring and fiddling around with it, it probably cost me much more.) Nor can I forget the hours configuring machines to do fairly simple
9%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
point. OpenACC has two major versions: Version 1.0 of the standard, announced November 14, 2011, included a number of directives for coding accelerators (initially GPUs), and very quickly Open
9%
Multicore Processing in Python
22.08.2017
Home »  HPC  »  Articles  » 
library, Parallel Python, variations on queuing systems such as 0MQ (zeromq ), and the mpi4py bindings of the Message Passing Interface (MPI) standard for writing MPI code in Python. Another cool aspect

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice