Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (311)
  • Article (9)
  • News (7)
Keywords

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 33 Next »

18%
Microsoft System Center Virtual Machine Manager 2008 R2
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Tono Balaguer, 123RF.com
.0 or 2.0; Windows Remote Management (WinRM) 1.1 or 2.0; and the .NET framework 3.0 (SP1). The web-based SCVMM Self-Service Portal additionally requires Internet Information Server (IIS) version 7.0 or 7
18%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
lists all the processes in a window and includes more detailed information on the current process, such as access to directories (Figure 3). Figure 3
18%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
reported and need to be absolutely sure of time, use the -tt option to show seconds and microseconds since the beginning of the Unix epoch (Figure 3). The useful expressions shown in Table 2 can help you cut
18%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
filesystem (AFS) is another network filesystem that is available in a free implementation, OpenAFS [3]. On the other hand are cluster filesystems. Before computers can access "distributed" data, they first
18%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
18%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
into acceptance of the following aspects of your job as system administrator: 1. Users introduce risks to systems and data. 2. Networked computers are vulnerable to over-the-wire attacks. 3
18%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
. Here are some examples: _{3,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
18%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
. The client opens a connection to TCP port 443 on the server. 2. The client sends an "SSL Session Setup Message" to indicate that it wants to set up an SSL connection to the server. 3. The server sends an SSL
18%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
or rendering of the results. According to the announcement, Maximus combines the 3D graphics capability of NVidia Quadro professional GPUs with the parallel computing power of the NVidia Tesla C2075 companion
18%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
Julia might not be an ideal choice, because of the overhead of compiling, are embedded and real-time applications (although even this may change [3] in the future). Julia was originally envisioned

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice