Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (213)
  • Article (2)
  • News (2)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 22 Next »

17%
Service Management Facility (SMF) in OpenSolaris
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Steve Cukrov, Fotolia.com
2 milestone:/multi-user:default Multiuser mode, all services started except NFS 3 milestone:/multi-user-server:default Like 2, but with NFS 4
17%
Fishing with Remora
09.12.2025
Home »  Articles  » 
 
and boundary exchange across the 2D grid. This version was run on 24 CPU cores. CPU utilization is shown in Figure 4. The chart for this case is particularly interesting, in that it reveals extensive process
17%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
pdf, a text editor is launched. You can then insert the clipboard content and add the search keys (customer ID, date, complaint, return number, etc.). The shell script uses pdflatex [4] to convert
17%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
of the intended target and host, you can use Nemesis to ARP poison the target. Nemesis [4] is a "command-line network packet crafting and injection utility" that can "craft and inject ARP, DNS, Ethernet, ICMP, IGMP
17%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
, and so on. The new versions of the Management Packs support detailed customization of rules (Figure 4). Figure 4: Server monitoring based on Management
17%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
on the iPad because space is not at such a premium. Most apps only consume a few megabytes of space. One year after purchasing my iPad, I have used less than 4GB of my 32GB, and I have hundreds of apps
17%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
/partitions Read detected disk partitions echo 1 > /proc/sys/net/ipv4/ip_forward Enable IP forwarding Listing 1 cat /proc/interrupts Output 01 CPU0 CPU1 02 0
17%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
. There are unpublished and unmitigated vulnerabilities in your operating systems. 4. No operating system is secure. 5. Services introduce risks. Accepting acceptable risk shouldn't keep you up at night worrying about
17%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
certificate to the client. 4. The client validates the server certificate, identifies the correct encryption method for the SSL session, and creates a session key, which it encrypts using the public key from
17%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
the USB memory stick, you need to install Syslinux 3.86 [4] on the stick and in the Master Boot Record. The following commands take care of this: syslinux-3.86/linux/syslinux /dev/sdb1 cat syslinux-3

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice