Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (67)
  • News (4)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 25 Next »

100%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Rubén Llorente ... of domains for which you host email, managing quotas, and viewing the logs (Figures 6 and 7). Figure 6: iRedAdmin lets you create email accounts for users
99%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... . Citadel Rooms Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure 6). For example, on a floor called Animal Talk , you might have the rooms
99%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... ). Figure 4: A VPN allows computers in a network to contact devices located in a separate office over a secure connection. Ludovic.ferre CC BY-SA 4.0 [6
99%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is well documented [5], and you can find useful tips on their website. Of special interest is the Recipes section [6], which includes example tasks for uploading files or copying scripts into the servers
99%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
Rubén Llorente ... obtaining the password is no longer enough for the attacker. The steps for using the Nitrokey in such a way are documented [6], but setting up the configuration involves messing with PAM configuration files
99%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... them in an orderly manner. Proxmox VE has been covered before in other articles [5][6], so I suggest you check them out if you want an in-depth review
56%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
56%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
53%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
have created. Probably the most predominant version is NPB-GPU [6], which uses the CUDA parallel computing platform and programming model to produce the GPU versions of the five kernels and three pseudo
53%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
) BT (4 cores) 11.95 66.5 272 CG (4 cores) 0.4 23.9 62.3 EP (6 cores) 1.4 5.46 21.05 FT (4 cores) 1

1 2 3 4 5 6 7 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice