Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb"22%A9n Llorente ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (35)
Keywords

« Previous 1 2 3 4 Next »

29%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
by a generic description for the resource agent and a copyright notice; a list of parameters supported by the resource agent should follow to provide an at-a-glance overview. The header doesn't follow any
29%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Dmitry Tsvetkov, 123RF.com
.894212] vmware-hostd[3870]: segfault at 2100001c4f ip 0000003c0cb32ad0 sp 00007f3889e9cb88 error 4 in libc-2.12.90.so[3c0ca00000+19a000] Analysis and Plan A Initial analysis proved that the VMware
29%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
thus assumed an upgrade scenario that included replacing the motherboard with on-board graphics and sound, the CPU, the RAM (1,024MB), and the hard disk (320GB). After investigating prices, the authors
29%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
29%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
.1_release_notes oVirt Installation Guide: http://www.ovirt.org/w/images/a/a9/OVirt-3.0-Installation_Guide-en-US.pdf
29%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
Chris Buechler and Scott Ullrich were unhappy. Although the FreeBSD m0n0wall distribution gave them a quick option for setting up a firewall and a router, it was designed for use on embedded systems
29%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3
29%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
to a 100Mb network, the path through the faster router wins. Where the paths are equivalent, the administrator can manually add a weighting value to the configuration, which is then reflected in the LSA
28%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
28%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sda 20 Account information: 21 ACL information: 22 ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice