Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (25)
Keywords

« Previous 1 2 3 Next »

97%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
network services Configure IPv6 NetShell is available on both client and server variants of Windows. In some cases, if an additional network service, such as DHCP, is installed on a Windows Server ... 2012
97%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
: 4012008 3858124 153884 0 11644 440852 04 -/+ buffers/cache: 3405628 606380 05 Swap: 4085756 353784 3731972 06 $ Linux 2.6 introduced a new swappiness ... 2012
96%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
for internal communication in the node and one for communication with the applications. The following example uses CentOS 6.2 with the newest updates. At first, the installer should make certain that all ... 2012
96%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
this writes an LVM label and some metadata to the PV. The PV is divided up into units of the same size (4MB by default) known as physical extents (PEs). A PE is the smallest allocatable data volume. Figure 1 ... 2012
96%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
.g., 100 for VLAN 100). Type a 1 as the tunnel assignment ID to define a tunnel session ID. You need to configure the same settings for restricted network access; that is, you specify the VLAN ... 2012
96%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
.g., 192.168.0.0/24). # tcpdump net 192.168.1.1/24 Src, dst Only capture packets from a source or destination. # tcpdump src 192.168.100.234# tcpdump dst 10.10.24.56 host ... 2012
96%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred ... 2012
96%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
Hat's Solutions Architect was also a very helpful resource. We tested Red Hat Satellite Server over a three-month period, with Satellite Server installed on an HP Proliant DL380 G5 Server, using RHEL 6 ... 2012
96%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
to technical computing 06 | | | | | | |/ _` | | 07 | | |_| | | | (_| | | Version 0.0.0+86921303.rc6cb 08 _/ |\__'_|_|_|\__'_| | Commit c6cbcd11c8 (2012-05-25 00:27:29) 09 |__/ | 10 ... 2012
96%
Top three HPC roadblocks
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Alexey Bogatyrev, 123RF.com
-hanging fruit, for which fewer than 100 cores can have a huge economic effect, why does the HPC market focus on benchmark results that require tens of thousands of cores? Perhaps the belief that "press release ... 2012

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice