Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb"22%A9n Llorente"22 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (27)
Keywords

« Previous 1 2 3 Next »

85%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
to the Asterisk PBX" 18 return $OCF_ERR_GENERIC 19 fi 20 21 # Optionally check the monitor URI with sipsak 22 # The return values: 23 # 0 means that a 200 was received. 24 # 1 means
85%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
20 21 22 23 24
85%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
System (output follows) 09 DOWNLOAD PKGS FILES XFER (MB) 10 Completed 20/20 3021/3021 42.55/42.55 11 12 PHASE
84%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sda 20 Account information: 21 ACL information: 22 ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
84%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
notification_interval 60 16 notification_options d 17 } 18 19 # Fileserver 20 define host{ 21 host_name fileserver 22 alias Fileserver 23
84%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
84%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
about the I/O performance on the guest systems, I was able to measure these speed hits on the HP system compared with the bare metal system. Installing a battery-buffered, 512MB write cache module vastly
83%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
/server/all/deploy/helloworld.war 10:25:22,371 INFO [TomcatDeployment] undeploy, ctxPath=/helloworld # cp -r /opt/examples/helloworld.war/ /opt/jboss-5.1.0.GA/server/all/deploy/ 10:25:22,412 INFO [TomcatDeployment] deploy, ctx
83%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
SQL. You can just upload your web application and enjoy the ride. Keep in mind that Google imposes limits to this freefest. Their hospitality is limited to 500MB of disk space and traffic volume of 1GB per
83%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice