Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (28)
Keywords

« Previous 1 2 3 Next »

60%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768MB of RAM and a Pentium 3 CPU, took a total of 22 seconds to answer ... 2010
59%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
) }' -c '/bin/ls -l' total 20 -rw-rw-r--. 1 tscherf tscherf 18216 2010-04-12 09:02 systemtap.txt clone_quoting_options o=0x0 clone_quoting_options o=0x0 Cross-Compiling If you want to run a System ... 2010
59%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
under the 18 # following copyright: 19 # 20 # (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors 22 # 23 # See usage() function below for more details ... 24 # 25
59%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
-On The current v1.5 of Proxmox VE from May 2010 [1] is based on the Debian 5.0 (Lenny) 64-bit version. The Proxmox VE kernel is a standard 64-bit kernel with Debian patches, OpenVZ patches for Debian, and KVM ... 2010
59%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
they should be doing anyway – putting together a solid business plan and making good use of cloud technology. To win, a company has to be a start-up formed in 2010 or 2011, and the company must have a business
59%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
/2001/XMLSchema-instance" 05 xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-2.0.xsd 06 http
58%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
this in shell script: vbyear="2010" year=`readpreprompt "Calendaryear: " $vbyear` The readpreprompt command expects a prompt and a default surrounded by backticks, which you can either hard code or feed ... 2010
58%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
active_checks_enabled 1 22 passive_checks_enabled 0 23 check_command check_ssh 24 max_check_attempts 3 25 ... 2010
58%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
/server/all/deploy/helloworld.war 10:25:22,371 INFO [TomcatDeployment] undeploy, ctxPath=/helloworld # cp -r /opt/examples/helloworld.war/ /opt/jboss-5.1.0.GA/server/all/deploy/ 10:25:22,412 INFO [TomcatDeployment] deploy, ctx
58%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice