Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 189 Next »

9%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
tells you whether the system is infected. Middle Ground: Linux Malware Detect Linux Malware Detect (LMD) [5] is a kind of middle ground between rootkits and antivirus scanners. The project collects
9%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
5, but on RHEL 6, which offers a number of advantages KVM-wise. For example, guests can use up to 64 virtual CPU cores and up to 2TB of memory. Additionally, the RHEL6 kernel supports all current KVM
9%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
kernel sles:~ # grep crash /proc/cmdline root=/dev/disk/by-uuid/10a83ffe-5a9f-48a2-b8cb-551c2cc6b42d resume=/dev/sda3 splash=silent text showopts crashkernel=128 sles:~ # /etc/init.d/boot.kdump status
9%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
within their own networks with a higher probability (Figure 5). Figure 5: Proportion of all registered attacks from Germany with existing sensors
9%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
. For example, if you press the Tab key to allow the shell to auto-complete the name of the directory, you will only see a truncated version of it in the list (see Figure 5
9%
What's new in Small Business Server 2011
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
A&M Rovenko, 123RF
interface, and they extend the server's feature set with respect to backup, Internet connectivity, security, and other areas (Figure 5). Figure 5: SBS 2011
9%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Cannon, and Eclipse. The goal of Cloud Engine is to implement an open source cloud broker (Figures 4 and 5). The Deltacloud API is used here to facilitate views on the virtual clouds of each user, as well
9%
Configuring XP Mode in Windows 7
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF.com
, which finally lets you change the settings (Figure 5). Figure 5: The integration Features and other settings for XP Mode can only be changed after shutting
9%
The webmaster's control panel
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
PozitivStudija, Fotolia.com
a user name and password associated with it; a strength meter and password generator are included to help you generate secure passwords (see Figure 5
9%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
. This means daisy needs the current MONmap for the RADOS cluster. You can read the MONmap on one of the existing RADOS nodes by typing ceph mon getmap -o /tmp/monmap (Figure 5), and then use scp to copy

« Previous 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice