Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%2n2222a Llorente 22 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (23)
Keywords

« Previous 1 2 3 Next »

91%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
20-kl-listing-bold]zlib[/UCC] and [UCC:x20-kl-listing-bold]libxml[/UCC] . Debian and Ubuntu call them [UCC:x20-kl-listing-bold]zlib1g-dev[/UCC] and [UCC:x20-kl-listing-bold]libxml2-dev[/UCC] ; open
91%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
m Memory n Networks s Sockets t TCP x Interconnect y Slabs Table 2 lists the aspects that can be measured
91%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
/inet/IPsecinit.conf: Contains the policy, like the setkey script on Kame/Racoon; however, the file also contains the algorithms for Phase 2. A tunnel interface is also typically configured. /etc/hostname.ip.tunX: Typically
90%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
90%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
} 20 \usepackage{ngerman} 21 \usepackage[official,right]{eurosym} 22 \\\begin{document}" > att1.tex 23 echo "\end{document}" > att3.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
90%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
=TR/CN=John_Doe/emailAddress=jd@example.com 07 Serial: 03 08 Serialized id: SafeNet\x20Inc\x2E/eToken/xxxxxxxx/eToken/xxxxxxxxxxxxxxxxxx OpenVPN Management Interface Because Linux systems don't have a crypto store, you need
90%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
qemu_x86_defconfigmake menuconfig (build-option, Kernel-Version 3.2, gdb, tty1)makemake linux-menuconfig (debug info) make 3. Compile the module and copy it to the root directory:cd driverexport CROSS
89%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
initial tests are quite reasonable: 1GB memory, a virtual CPU, about 20GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun xVM VirtualBox is a good choice
89%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
idea to choose an intuitive name. Listing 2 shows an example. Listing 2 Your Own Domain in OpenShift 01 # rhc-create-domain -n tuxgeek -l tscherf@gmail.com 02 Password: 03 Generating
88%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
"Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21 if state[inst.id] 22 puts "#{inst.id} changed from

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice