Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (195)
  • Article (1)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

17%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
: 4012008 3858124 153884 0 11644 440852 04 -/+ buffers/cache: 3405628 606380 05 Swap: 4085756 353784 3731972 06 $ Linux 2.6 introduced a new swappiness
17%
Looking for System Admins …
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Piter Ivanov, 123RF
with Knoppix 6.3 Live Linux and the BackTrack penetration testing system. Take a fresh look at what you do every day with a special edition magazine that is all for admins.
17%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
surprise that, when Red Hat Enterprise Linux 6 was released, the currently available DISA STIGs were still based on RHEL4. Administrators will tend to work through the checklist manually in a process
17%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
in the directory structure is clear once you've installed it. Script Kiddies and Port 22 As I mentioned, the most popular usage of fail2ban is stopping probes that try every username ever conceived by mankind
17%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
"------------------------------------------------------" 18 echo -n "Replace stored data line (y)? ";read we 19 if [ "$we" = "y" ]; 20 then 21 22 # Delete line and write to 23 # temporary file 24 25 # Build sed instruction 26
17%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
TOP, use make and then sudo make install. Before you can launch the tool, though, you'll need to fulfill a couple of conditions. Tick Tock Older Linux kernels (up to version 2.6.20) use a fixed heartbeat
17%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
, the number of users is fairly low, that's likely to change when version 3.6 of Samba, which will include SMBTA as an official component, is released [1]. Although experienced admins would have no trouble
17%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
use it over the Internet, set up a VPN to connect systems to it). This solution is not magical, but it drives home the point that you need to test and verify security measures using tools like Nmap [6
17%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
: plug another memory leak 05 c90fc4c934ac7b024c1fc1813bb3cffb5333e18f lockdown: move writing of device uuid to client struct inside lockdownd_client_new() 06 f0487376671ffd6ac3fc121657f1fbd0acea3cb0
17%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
. The badness score calculation for the popular 2.6.32 kernel [5] follows this logic: Any process caught in the swapoff() system call is killed first, followed by a score evaluation that baselines on memory size

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice