Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (275)
  • Article (79)
  • News (11)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 37 Next »

37%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
37%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
the simple text file hpc_001.html : [laytonjb@home4 TEMP]$ ls -s total 7288  196 hpc_001.html  7092 MFS2007.pdf [laytonjb@home4 TEMP]$ 7z a -p hpc_001.html.7z hpc_001.html   7-Zip [64] 9.20  Copyright (c
37%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery
37%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
37%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
}, 11 "run_list": [ "recipe[bootstrap::client]" ] 12 } Now you can launch Chef Solo: sudo chef-solo -c ~/solo.rb -j ~/chef.json -r http://s3.amazonaws
37%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
command: # sockstat | grep "\*:[0-9]" The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service: inetd_flags="-wW -a
37%
New Vulnerabilities Found in Windows Remote Desktop Services
14.08.2019
Home »  News  » 
 
computer without user interaction. The vulnerabilities affect all recent versions of Windows, including Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2
37%
All for Admins
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
networks. Red Hat published the source code for their popular Network Satellite management tool in 2008, and a community version known as Spacewalk soon followed. Our first article takes you on a walk
37%
Azure Sphere for Internet of Things
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Zosia Korcz on Unsplash
executed by this core cannot access the other cores. Finally, a separate core implements the WLAN subsystem. The MCU is dual-band and compliant with the 802.11a/b/g/n standards. The MT3620 isolates
37%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
. The required modifications are explained in the Huginn wiki [3]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice