Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 189 Next »

99%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 } 22 } 23 24 Messages { 25 Name = Daemon 26 ... 5
99%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
, in a cloud environment, is typically not so easy to do. Depending on the service model (SaaS, PaaS, or IaaS [5]) and the extent to which the Cloud Service Provider (CSP) cooperates, users may be able ... 5
99%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
5) as parameters. Listing 5 Setting Up Lists 01 sudo -u mlmmj /usr/bin/mlmmj-make-ml -s /var/spool/mlmmj/documentfoundation.org -L announce 02 sudo -u mlmmj /usr/bin/mlmmj-make-ml -s ... 5
99%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
flag is AdvOtherConfig. According to the IETF [1] and the radvd man page [4], this flag is supposed to be explained in RFC 4862 regarding IPv6 stateless address autoconfiguration [5]. However, document ... 5
99%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
), 28 highCritical(4), lowWarning(5), lowCritical(6), sensorError(7)"/> 29 30 ... 31 5
99%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
-Filter button. The following entry: host IP address restricts the data volume to packets sent or received by the host with the specified IP address (Figure 5 ... 5
99%
Windows Performance Toolkit and System State Analyzer
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ewa Walicka, fotolia.com
tools in parallel provides a more revealing analysis of the trace results. Hard Disk Activity The free Diskmon tool from Microsoft Sysinternals [5] shows you all read and write access for a hard disk ... 5
99%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
5
99%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
5
99%
This Issue's CD
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
5

« Previous 1 2 3 4 5 6 7 8 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice