Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (216)
  • Article (2)
Keywords

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next »

18%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
. Here are some examples: _{3,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
18%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
. The client opens a connection to TCP port 443 on the server. 2. The client sends an "SSL Session Setup Message" to indicate that it wants to set up an SSL connection to the server. 3. The server sends an SSL
18%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
or rendering of the results. According to the announcement, Maximus combines the 3D graphics capability of NVidia Quadro professional GPUs with the parallel computing power of the NVidia Tesla C2075 companion
18%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
't envisage a centralized instance for mutual authentication. Although RFC 4474 [3] defines how to sign SIP messages to allow Alice to authenticate against Bob, there are no widespread implementations
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
18%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3
18%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
/FTP Proxy . If you select HTTP/FTP proxy, you have to fill in the information for your proxy host and port number. Next, you need to select a download site from the list displayed on the screen. In Figure 3
18%
A free anti-spam tool for Exchange environments
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© baurka, 123RF.com
businesses might also be interested in the POP3 connector in ASSP. This feature lets you pick up email from various POP3 servers, scan the messages for viruses and spam, and then forward the results
18%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
on the properties of the file format. Pen testers can use a tool called Metagoofil [3] to help find metadata on websites. Metagoofil is an information-gathering tool designed for extracting metadata off public
18%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
], Fabric [3], or Capistrano [4], MCollective relies on middleware based on the publish/subscribe method to launch jobs on various nodes. The middleware supported by the framework can be any kind of STOMP

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice