Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (438)
  • Article (99)
  • News (43)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 59 Next »

57%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
: mkcephfs -a -c /etc/ceph/ceph.conf -k /etc/ceph/admin.keyring Now you need to ensure that ceph.conf exists on all the hosts belonging to the cluster (Figure 3). If this is the case, you just need to start ... 9 ... 2012
57%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment ... 9 ... 2012
57%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
9 ... 2012
57%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
, but you will be spending time deciphering instructions, hunting down tools, and undoing missteps before you can enjoy your new furniture. Indeed, should you not have the mechanical inclination to put bolt A ... 9 ... 2012
57%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
); the Listing 2 Custom Image with Image Builder PowerCLI C:\> Add-EsxSoftwareDepot E:\update-from-esxi5.0-5.0_update01.zip PowerCLI C:\> Get-EsxImageProfile PowerCLI C:\> Add-EsxSoftwareDepot E ... 9 ... 2012
57%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
operation by swapon. Disabling swap is often required when analyzing a system's memory performance, and this can be accomplished easily with /sbin/swapoff -a (and restored with /sbin/swapon -a). Current use ... 9 ... 2012
57%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
BladeSystem C7000 Enclosure. The drawing in Figure 1 illustrates the lab environment. Figure 1: A simulated working environment to test Red Hat Satellite ... 9 ... 2012
57%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
that the configuration file config.txt is located in C:\TEMP on your systems. With the following script, you can easily retrieve the contents of that file: ForEach ($system in Get-Content "systems.txt") { Write ... 2012
57%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
2012
57%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
with official IPv4 addresses (Class A/B/C) can generate a 6to4 address that consists of the prefix 2002::/16 and the official IPv4 address of the host. Thus, all hosts on an intranet are locally adjacent and also ... 2012

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice