Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (274)
  • Article (8)
  • News (5)
Keywords

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 29 Next »

10%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
distributions of the Go package. After the installation, your hard drive will contain (depending on the processor architecture) the commands 6a, 6c, 6g, and 6l – or their counterparts with the digits 5 or 8
10%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
. Because I wanted a very detailed look at what's going on with my critical systems, I selected all of the possible notifications in the Notifications tab in the primary tab list (Figure 5). Next, I clicked
10%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
this attack [5]. Sniffing the LAN One goal of ARP cache poisoning is to put the attacker in a position to capture and log network information. Intruders have several tools for listening on the LAN and logging
10%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
) and a paid version (VNC, US$ 5.99) are available. The paid version has keyboard and mouse enhancements that any sys admin would want in a VNC client. By comparison, the Lite version has too many disabilities
10%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
. What Comes Next In agile projects, prioritizing backlog candidates has proven to be challenging. Planning Poker [5] and other methods can help decide which tasks should go to the fore. Experience has
10%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
with the -d option (Listing 5). Listing 5 Verify sshd 01 bash#> /usr/local/sbin/sshd -d 02 debug1: sshd version OpenSSH_5.6p1 03 debug1: read PEM private key done: type RSA 04 debug1
10%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
overtaxing a system's RAM could ruin the very performance metric you are tuning. The Instagram team has released a vmtouch script [5] that dumps the page cache status of an EC2 instance, allowing you to carry
10%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
the basic events and those available on every Ubuntu system, you can launch the man upstart-events man page (Figure 5). The existing job files in /etc/init are another source of information
10%
A free anti-spam tool for Exchange environments
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© baurka, 123RF.com
it to internal email servers. However, you will not want to choose this approach if your server needs to process more than 5,000 pieces of email a day. Scanning for viruses and spam consumes a fair amount
10%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
of bad news, however. Many of the presentations not only present problems but also discuss the solutions. The perfect example was a presentation called "Lifting the Fog" [5], in which Marco Slaviero

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice