Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm 22%21490 Llorente%2012q2 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (39)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 Next »

24%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
-Host "Removing outdated $MigMBox.pst file." -fore yellow 20 } 21 Write-Host "" 22 23 # Create a .pst file for every mailbox found on system. 24 # 25 Write-Host "Exporting mailbox $MigMBox to file $Mig
24%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
24%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
="4096" 12 13 # Last offset to try 14 final_offset="$(du -b "$DEV" | cut -f 1)" 15 16 # A free loop device 17 LOOP="/dev/loop2" 18 19 # Start 20 offset=0 21 22 while [ "$offset" -lt "$final_offset" ]; do
24%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sda 20 Account information: 21 ACL information: 22 ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
24%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
"nics": [ 16 { 17 "nic_tag": "admin", 18 "model": "virtio", 19 "ip": "dhcp", 20 "primary": 1 21 } 22 ] 23 } You can use this option for Windows virtual machines
24%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
the required cluster in just a few minutes. The following example assumes that all commands are run on Ubuntu 22.04, but most of the commands will probably work on other distributions with just a few minor
24%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
addr = 10.42.0.101:6789 14 [mon.b] 15 host = bob 16 mon addr = 10.42.0.102:6789 17 [mon.c] 18 host = charlie 19 mon addr = 10.42.0.103:6789 20 [osd.0] 21 host = alice 22 [osd.1] 23 host
24%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
: 18 - "blog.datadoc.info" 19 --- 20 apiVersion: networking.istio.io/v1alpha3 21 kind: VirtualService 22 metadata: 23 name: wordpress 24 spec: 25 hosts: 26 - "blog.datadoc.info" 27 gateways
24%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
24%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
21 # The name and age of the persons who know the person with ID 1: 22 gremlin> g.V(1).outE('knows').inV().valueMap('name', 'age') 23 ==>[name:[vadas],age:[27]] 24 ==>[name:[josh],age:[32]] 25 26

« Previous 1 ... 11 12 13 14 15 16 17 18 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice