Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%C3%A9n Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (181)
  • Article (76)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 26 Next »

62%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
know that the output will be manageable. $ rg -i bicycle Nextcloud3/Linux-User/ Figure 2: Narrowing down by stating the path gives you more targeted
62%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
. Figure 1: iperf3 client in action. Note how network results can vary significantly over just a few seconds. Figure 2: Running the iperf3 server
62%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
types (geographical, infrastructure, and so on), which is part of the default installation scope. Shapes and Sizes Zabbix is released under the GNU GPL, and the latest version 1.8.9 can be downloaded
62%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
on the options you chose, but some sample output is shown in Listing 1. Listing 1: Sample iostat Output [laytonj@home8 IOSTAT]$ iostat -c -d -x -t -m /dev/md1 2 100 Linux 2.6.18-308.16.1.el5.centos.plus (home8
62%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1 ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
62%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Dmitry Tsvetkov, 123RF.com
.894212] vmware-hostd[3870]: segfault at 2100001c4f ip 0000003c0cb32ad0 sp 00007f3889e9cb88 error 4 in libc-2.12.90.so[3c0ca00000+19a000] Analysis and Plan A Initial analysis proved that the VMware ... 3 ... VMware Server 2.0 on recent Linux distributions
62%
A web application with MongoDB and Bottle
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Egor Arkhipov, 123RF.com
will be using the Mongo shell to create a document (Listing 1). Listing 1 Test 01 # mongo 02 MongoDB shell version: 2.2.0 03 connecting to: test 04 > use football 05 switched to db football 06 > db
62%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
addresses to connect /etc/hosts.allow , the file would simply look like this: sshd: 10.10.10.10, 1.2.3.4, 21.21.21.21 TCP Wrappers works nicely, even if you change the standard SSH port (it’s usually TCP
62%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
=readall(`date`) "Tue Jul 31 15:51:58 EDT 2012\n" julia> print(d) Tue Jul 31 15:51:58 EDT 2012 In addition to efficient shell integration, Julia also has a very nice C and Fortran interface. Typically, every new
62%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice