Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (72)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

28%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
later on, but in the meantime, the following is a class configuration line: tc class add dev $DEV parent 1:1 classid 1:12 cbq bandwidth $BAND rate 25Mbit allot 1514 cell 8 weight 2500Kbit prio 3 maxburst
28%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
this user will be rejected (unless you have a nagios@mydomain.com email address set up). If you're using exim4 , you need to set the untrusted user option and then add the line -- -f arealaddress@mydomain.com
28%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
://lxr.free-electrons.com/source/mm/oom_kill.c?v=2.6.32 mm/oom_kill.c: http://lxr.free-electrons.com/source/mm/oom_kill.c?v=3.2 The Author Federico Lucifredi is the maintainer of man(1
26%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
ADDRESS [Cut first seven hops for brevity] 8 10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142) 9 11.00 metro0.sv.svcolo.com (208.185.168.173) 10 9
26%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
recently by bashtop [2] [3], its more performant cousin bpytop [4], and many others [5] alongside the evergreen original top [6]. Rust-based, Bottom promises a more lightweight and highly customizable cross
26%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
.4/hour (US$ 0.15/core per hour), Cluster GPU instance is US$ 2.1/hour, and the High I/O instance is US$ 3.1/hour. Thus, using the small usage case (80 cores, 4GB of RAM per core, and basic storage of 500
26%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
– such as enabling the network or launching the httpd. Each of these tasks is a job from Upstart's point of view, but it will only take on a job if a matching event has occurred previously. An event of this kind could
25%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
25%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
)\n\Process\: %d (pid %p)\n\User\:%u\n\Host\: %c\n\Date\: $(date)\n\" | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & The SPAWN command has lots of other uses, including communicating
25%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
-integrated DNS. This process is not tied to consistency checks and opens vectors for all kinds of name spoofing, which in turn is essential for man-in-the-middle attacks. Identical cryptography for NT LAN

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice