Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3&00 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (212)
  • Article (64)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 29 Next »

17%
AlmaLinux 9.0 Beta Now Available
26.04.2022
Home »  News  » 
 
5.2, MySQL 8.0, Redis 6.2, GCC 11.2, Glibc 2.34, binutils 2.35, Go Toolset 1.17.7, GDB 10.2, and more.  To find out more about the changes, check out the official AlmaLinux 9.0 release notes
17%
Malware Remains Top Cause of Cybersecurity Incidents
16.01.2023
Home »  News  » 
 
)." Specifically, the report's vulnerability scan data shows that: 28% of all findings are addressed in less than 30 days. 72% of all findings take 30 days or more to patch. 52% of all findings take 90
17%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
17%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host 00:25:4b:bd:24:94 However
17%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
ZJOUoUsZGlkk client2:q0eL78zFrbnESW6c/F0qit5MNCpS8IBgyh1BdXiyyuI client3:zkq8eT31Nib3IHWfp0yyu15BCW52VMbY8+LhVUt3ylA The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file: client1:Wf
17%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
17%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
for it at /proc/loadavg/ [3]:   1.00 0.97 0.94 1/1279 7743   The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last
17%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
/loadavg/ [3]: 1.00 0.97 0.94 1/1279 7743 The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
17%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
have 26 cores or 52 hyperthreads per NUMA node for the VM. Figure 2 shows a four-socket server with 28 cores per socket and 6TB of RAM. Figure 2: A four
17%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
01 auto br0 02 iface br0 03 bridge-ports swp1 swp2 swp3 swp4 swp5 04 bridge-stp on Because the list would be pretty long for 52 ports, you can also do the following specify

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice