Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (179)
  • Article (61)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

14%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
/sbin/named ... 774 ?? SsJ 0:00,12 /usr/sbin/sshd ... 781 ?? IsJ 0:00,87 /usr/sbin/cron -s ... The jls command lets you view all the currently active jails, as shown in Listing 6. Listing 6 Active Jails
14%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache. I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup
14%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
. The output for the Samsung SSD is: [root@home4 ~]# smartctl -i /dev/sdb smartctl 5.43 2012-06-30 r3573 [x86_64-linux-2.6.32-358.18.1.el6.x86_64] (local build) Copyright (C) 2002-12 by Bruce Allen, http
14%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
rq2 ra92 08 set rq3 cdrom 09 10 attach rq0 d0.dsk 11 attach rq1 d1.dsk 12 attach rq2 d2.dsk 13 14 attach -r rq3 cdrom.iso 15 16 set rl disable 17 set ts disable 18 19 set xq mac=08-00-2B-AA-BB-CC 20
13%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
for an intrusion attempt. Figure 1: PC1 sends out a data frame with the destination address ABCD.EF00.0004. The switch receives it at port 1 and then searches
13%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
.network.type = veth 04 lxc.network.flags = up 05 lxc.network.link = br0 06 lxc.network.hwaddr = 08:00:12:34:56:78 07 #lxc.network.ipv4 = 0.0.0.0 08 lxc.network.ipv4 = 192.168.1.69 09 lxc.network.name = eth0 10 lxc
13%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
Code Example 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my
13%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
\ 02 --hostname=foo.bar.de --mac- address=00:40:26:CA:10:DD \ 03 --kopts="stage=test app=www" --ksmeta="stage=test app=www" 04 # cobbler system edit --name=foo --interface=eth0 --mac=00:40:26:CA
13%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
be no question of disabling the legacy algorithm for the time being. However, disabling MD5 signatures is something that you can (and should) do today. You can enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2
13%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
key RSA EIGamal DSA Cipher IDEA 3DES CAST5 Blowfish AES-128/-192/-256 Twofish Camellia-128/-192/-256 Hash MD5

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice