Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (68)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

28%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
) for evaluation and visualization. SMBTA uses an existing SQL database (sqlite3) to store the traffic data. The developer and inventor of SMBTA, Novell's Holger Hetterich, has been working on his Samba Traffic ... 3
28%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
28%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
filesystem (/) resides on sda2 and weighs in at 20GB. The remaining 75GB are assigned to the partition sda3. I will be using LVM to merge it with the whole of the second disk sdb. The logical volume of 175GB
28%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Dmitry Tsvetkov, 123RF.com
/usr/lib/vmware/bin/vmware-hostd |awk '{print $3}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\n' -qf |sort -u 20 glibc 21 libgcc 22 libstdc++ 23 libxml2 24 nss-softokn-freebl 25 zlib 26 ... 3
28%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... 3
28%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
at allocation time. Only memory pages in actual use ("dirty") are backed by physical RAM, so the program shown in Listing 1 will have no trouble allocating 3GB of memory on any current machine, almost
28%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
filesystem, if so desired [5]: $ guestfish -N fs:ext3 When you call Guestfish with the new image, $ guestfish -a you are taken to a shell where you first need to enter run to toggle the system
28%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
28%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
="" 04 PING="ping -c1 -w 3" 05 PING2="" 06 07 case $OS in 08 HP-UX*) 09 PING=ping 10 PING2="-n 1" 11 RSH="remsh" 12 RSH2="-l user" 13 ;; 14 Sun
28%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
construct for assigning a value to a variable – here the variable host. The form [lindex $argv n] returns the n th argument to the script (numbering starts at 0), so the first command places the first script

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice