Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (163)
  • Article (1)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »

17%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
= database.createNode(); 09 // Set properties: 10 dortmund.setProperty("Name", "Dortmund"); 11 cologne.setProperty("Name", "Köln"); 12 // Create edges: 13 Relationship a1_do_k = dortmund
17%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
" 05 06 signing_ca_path "/var/chef/ca" 07 couchdb_database 'chef' 08 09 cookbook_path [ "/var/chef/cookbooks", "/var/chef/site-cookbooks" ] 10 11 file_cache_path "/var/chef/cache" 12 node
17%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
access and its potential optimizations. The time series panel at the top in Figure 12 shows the detailed course of the file access cursor, along with the calculated offsets. The colors of the points
17%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
of the system, the user who wrote the message or the tag used to write the message, and, after a colon, the message itself: ... Jun 28 12:24:55 laytonjb-Nitro-AN515-55 laytonjb: Just a test ... This capability
17%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
:external/ipmi 10 params hostname="bob" ipaddr="192.168.122.111" 11 userid="4STONITHonly" passwd="evenmoresecret" interface="lanplus" 12 op start interval="0" timeout="60" 13 op stop interval="0" timeout
17%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jean-Marie Guyon, 123RF.com
-CERT [6]. I would recommend anyone doing work in the realm of ICS/SCADA systems to take this class. One day included a 12-hour exercise in which participants attacked (red team) or defended (blue team). I
17%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
$password = "test12345"; 09 // In a production web application, the password would be retrieved from a form filled out by the user 10 $hashwert = $hasher->HashPassword($password); 11 12 echo "Password
17%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
12 The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15 17
17%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
c/s virtual 12 13 Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE 14 Raw: 723 c/s real, 723 c/s virtual 15 16 Benchmarking: Kerberos AFS DES [48/64 4K]... DONE 17 Short: 378501 c/s real
17%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
technologies. Besides Xen, KVM, and VirtualBox, Libvirt also supports OpenVZ, VMware ESX, and GSX. The nagios-virt [12] tool was written on the basis of this API and helps administrators configure host

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice