Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (193)
  • Article (1)
Keywords

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

18%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
address to the target MAC address: Source MAC address: 0x0000A4F8B321 – The last byte is 0x21 (= binary 00100001); thus, the last three bits are 001. Target MAC address: 0X0000A2123456 – The last
18%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
display. But, the Iconia Tab A510 runs Android 4.0 Ice Cream Sandwich (ICS), which has been slightly customized by Acer to include a circular launcher. The front of the tablet features a 2Mpx camera
18%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
Size Used Priority 03 /dev/sda5 partition 4085756 52864 -1 The most common configuration is a dedicated swap partition (type 0x82), but you can use swap files hosted in a general
18%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
available as version 0.0.2 [8] (see the "Stresstest" box). Figure 1: Stresstest stresses SMBTAD by continually generating Samba traffic
18%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.0 in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline
18%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have to work around those
18%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
a DNS server, it uses three standard addresses as its name servers: fec0::1, fec0::2 and fec0::3. The prefix fec0 was originally the counterpart to the RFC 1918 addresses but has been deprecated. If you
18%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
12 The monitor is set up by /etc/opennms/poller-configuration.xml: 13 14 ... 15 17
18%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
], which can yield a surprising number of vulnerabilities in a short amount of time. Many of the best "smart" (protocol- or format-aware) fuzzers, such as Sulley [11] or Peach [12] are well documented
18%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice