Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1006)
  • Article (314)
  • News (203)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 153 Next »

9%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
are certainly justifiable: Disable the unencrypted connection and enable the SSL-protected web server by adding the following lines to the /etc/ntopng/ntopng.conf file, --http-port=0 --https-port=443
9%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
availability on request. In this way, all virtual servers can be centrally managed, whether they run locally or in the cloud. SCVMM SP1 or newer supports the new VHDX disks in Hyper-V 3.0 and Windows Server
9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
-based interface that lets you adjust extensive settings. Listing 1 IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0
9%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
9%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
9%
Fedora 16
01.03.2012
Home »  Articles  » 
 
the feature set or improve the speed of the kernel-based KVM and Xen virtualization solutions. After adding the last missing components for cooperation with the Xen hypervisor to kernel version 3.0
9%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
in to another node (n0 in this case). On the first login, the modules are loaded on the remote node. On the second login, with NOMODULES set, no modules are available: $ module list Currently Loaded
9%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
, it will only capture the first 68 bytes of each packet. Except in older versions of tcpdump, a snaplen value of 0 uses a length necessary to capture whole packets. Figure 1 dissects the output of a sample dump
9%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
is equal to or greater than 1. A query if errorlevel 0 goto success would fail because the error code 1 would be included. The type of error (e.g., missing permissions or non-existent file) is not specified
9%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
01 auto br0 02 iface br0 03 bridge-ports swp1 swp2 swp3 swp4 swp5 04 bridge-stp on Because the list would be pretty long for 52 ports, you can also do the following specify

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 153 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice