Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm 12%2008 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (289)
  • Article (64)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 36 Next »

22%
Network Grep
26.11.2012
Home »  Articles  » 
 
to your command lines. If you’re concerned about email traffic and need to watch all TCP traffic closely using the SMTP port, then you could construct a command line such as: # ngrep -d any port 25 Here
22%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
25Mbit allot 1514 cell 8 weight 2500Kbit prio 3 \maxburst 20 avpkt $PKT bounded 16 # Now add filters to your child class 17 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12
22%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
-consuming task, which is why license models by volume or processor performance are not a good fit for university operations. The current hardware comprises two x86 servers running Solaris 11.4, which have access
22%
Ransomware Infects 625,000 Systems
02.09.2014
Home »  News  » 
 
ransomware threat on the Internet,” and they believe the threat will “continue growing.” Since its appearance in November 2013, CryptoWall has infected 625,000 systems. Like other ransomware tools, Crypto
22%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
(my_struct), dimension(10) :: data_array 25 26 end program struct_test To access a specific part or member of a derived type, you simply use a percent sign (%), as shown in line 20. You can also make an allocatable
22%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
under the 18 # following copyright: 19 # 20 # (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors 22 # 23 # See usage() function below for more details ... 24 # 25
22%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
=> 12; 05 06 # Hash AV pairs: (load in vusers, throughput in gets/sec) 07 %tpdata = ( (1,24), (2,48), (4,85), (7,100), (10,99), (20,94) ); 08 09 @vusers = keys(%tpdata); 10 $model = "e-Commerce Final
22%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
constraint: requires maxRead(argv[1] @ example1.c:8:20) <= 9 needed to satisfy precondition: requires maxSet(buffer @ example1.c:8:12) >= maxRead(argv[1] @ example1.c:8:20) derived from
22%
Mailman 3.0 – a long time coming
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrey Bayda, 123RF.com
is a professional software tool, and the fan base appreciates its solid operating principles. Version 1.0 was released in mid-1999 [1], followed by 2.0 in 2000. The latest stable branch 2.1 appeared about 12 years ... Mailman 3.0 is a new major version, released 15 years after version 2.0. We put the new version through its paces and explain the installation procedure and new features.
22%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
of space (20 + 25 + 30), with no doubt lots of duplicated data wasting space and money. The backup world uses a few techniques that differentiate it from replication. The first is called a “full backup

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 36 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice