Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 ... 186 Next »

13%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS
13%
PowerShell Part 2: Manipulating Services, Processes, and Commands
17.04.2012
Home »  Articles  » 
 
and Windows Server 8 use the new PowerShell 3.0 that I’ll cover in a later entry. Starting and Stopping Services One of the basic duties of an Administrator is to start, stop, and restart services on systems
13%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
. It is used by all the parties (i.e., the mobile node, correspondent node, and home agent) in messages that have to do with the management and updating of bindings. Figure 3 shows the configuration
13%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
. One of the standard applications that relies on the REST API is Floodlight’s own GUI (Figure 3). Additionally, a Python-based Circuit Pusher automatically installs persistent OpenFlow rules
13%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
-friendly statistics that might be more suited to the less technical minded. Figure 3 shows MRTG Total Traffic Generator with some slightly modified output. Although it hasn’t been maintained since 2002, with only some
13%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
 , offers a test page where you can test your dual-stack connectivity (Figure 3). Figure 3: The Dual Stack Connectivity Chart offered by RIPE NCC [1] tells you
13%
Wireshark
27.11.2011
Home »  Articles  » 
 
then select Capture | Stop to stop recording, and Wireshark will display all of the packets it has captured (Figure 3). Figure 3: Launching Wireshark without
13%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
) could manipulate your redirections effectively through a browser, just like the aforementioned public services. An almost painfully simple htaccess file looks like that in Figure 3, demonstrating the 301
13%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
(Figure 3). In the future collaboration with it-novum, SUSE is looking to improve the Ceph plugin for openATTIC and extend it to include additional features. In the long term, the idea is to build a genuine
13%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
client and server TCP stacks. In this article, I've broken the list of tuning options into three groups: (1) NFS performance tuning options, (2) system tuning options, and (3) NFS management/policy options

« Previous 1 ... 159 160 161 162 163 164 165 166 167 168 169 170 171 172 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice