Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (188)
  • Article (1)
Keywords

« Previous 1 ... 12 13 14 15 16 17 18 19

15%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
Labs [6]. This variant is of most interest to corporations who already have accounts with these providers and use their spam and virus filters. If you're not a customer of one of these services but do
15%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
, visit the project website or attend the annual Bacula conference, which is being held along with the Bacula developer conference this year [6]. Additionally, Open Source Press intends to release a Bacula
15%
Windows Performance Toolkit and System State Analyzer
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ewa Walicka, fotolia.com
(WSSA) belongs to the Software Certification Toolkit and is available in 32-bit and 64-bit versions [6] [7]. Before you can use the tool for test purposes, you first need to create a snapshot; then you
15%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece of data and how it might have been modified, that is, who has viewed
15%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10 6d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is: 12 +--[ RSA 2048]----+ 13 | .. . o
15%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
. To set up mod_ssl, check out the Ubuntu Server Guide [6]; otherwise, you can secure the connection to the web server with some other encryption technology, such as over a VPN. In this case, you should
15%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
are in place. If necessary, it will issue an error message and quit. Listing 6 contains a validate function that would work for Asterisk – apart from the sipuri section, this function is very generic, so you
15%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
/3 weight 409600bit allot 1514b level 0 ewma 5 avpkt 920b maxidle 1.6ms Sent 185501283289 bytes 158312905 pkt (dropped 1492, overlimits 451813147 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0
15%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10

« Previous 1 ... 12 13 14 15 16 17 18 19

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice