Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (205)
  • Article (3)
  • News (1)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21 Next »

18%
BackTrack 5 R2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
Hydra Password cracking Kismet Packet sniffer Metasploit Pen testing Nmap Network scanning Ophcrack Password cracking RFMON
18%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
very surprised. After all, when you think of data theft, this is not typically what springs to mind. The culprits did not need to hack the network, because the people in charge had just ignored the issue
18%
Service Management Facility (SMF) in OpenSolaris
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Steve Cukrov, Fotolia.com
Management Resource Identifier (FMRI) identifies a service on the system. The service and instance name are passed to the FMRI as follows: svc:/Service:Instance In the following example, svc:/network
18%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
and extend the system's functionality." For example, the company states that the system provides easier integration with existing networks, visual server configuration and management, and other benefits
18%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
server. According to the announcement, Zentyal aims to provide small- and medium-sized businesses with "professional, reliable, and secure network infrastructure solutions that are both easy to use
18%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
for the virtual machine, copies the image file for the virtual disk, and gives the network adapter a new, random MAC address. The remaining hardware components remain unchanged. After cloning, however, much manual
18%
Virtualization with Microsoft Hyper-V
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Roman Sigaev, 123RF
. This setup works both with cluster shared volumes and with SANs or iSCSI solutions. If you use a separate network for cluster communications, make sure that the client for Microsoft networks and file
18%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
To operate Synergy, you need at least two PCs, each with its own operating system, monitor, and functional network card. The software supports Windows 95 through Windows 7, Mac OS X as of version 10
18%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
-Pprinter | grep -q "printer is ready" To match the output from lpq, you need to modify the search string for grep. The ping command checks network connections. The exit error codes differ, depending
18%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
manage CPU shares, whereas /cgroup/net_cls takes care of network I/O performance. Starting the cgconfig daemon creates the directories and mounts the cgroups filesystem. The lssubsys lets you verify

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice