Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (937)
  • Article (296)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 141 Next »

29%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
to experiment can simply copy the tool to a computer of their choice and convert the image there. The vmss2core -N6 .vmss command generates the kernel dump (Listing 3). During testing, this conversion
29%
PowerDNS: The Other Open Source Name Server
24.06.2013
Home »  Articles  » 
.conf ) by editing /etc/powerdns/recursor.conf . For brevity’s sake, I only include the configuration variables I have changed herein. allow-from=192.168.1.0/24 #The 'allow-from' address specifies the network address
29%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
unicast address. The home agent means that the MN is accessible everywhere via its home address (Figure 2). Figure 2: Mobile IPv6 terminology. The MN
29%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
into a ZIP archive: zip Ubuntu12041.zip /boot/System.map-3.2.0-29-generic module.dwarf This kernel profile should then be moved to the volatility/plugins/overlays/linux/ directory. The analysis feature
29%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
.keys.sort.each do |s| 14 printf "%20s %d\n", s, summary[s] 15 end 16 puts "Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21
29%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
 time:           5.245 seconds     iter    1   iter    5   iter   10   iter   15   iter   20    Benchmark completed  VERIFICATION SUCCESSFUL  L2 Norm is  0.5706732285739E-06  Error is    0.1345119360807E-12      MG
29%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
.logp gpu-manager-switch.log boot.log kern.log dmesg syslog dpkg.log Xorg.0.log dpkg.log   These logs typically have a more or less
29%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
(s), and DNS server. However, IPv6 offers several other features that are not controllable via the standard configuration dialog. Also, the overview you get when you press Details is very rudimentary (Figure 2
29%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
RR can be removed as soon as its DNS time to live (TTL) has expired. Listing 2 Fingerprint in the TLSA RR $ dig TLSA _25._tcp.mail.sys4.de +short 3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C
29%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
Initialization time: 5.245 seconds iter 1 iter 5 iter 10 iter 15 iter 20 Benchmark completed VERIFICATION SUCCESSFUL L2 Norm is 0.5706732285739E-06 Error is 0.1345119360807E

« Previous 1 ... 109 110 111 112 113 114 115 116 117 118 119 120 121 122 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice