Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 00 Llorente"22 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

76%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8
75%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [3] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ... 3
74%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
SUSE 11.3, the benchmark repository offers an up-to-date package [1]. Fio is also included with Fedora. The source code from the tarball or Git repository can be compiled with a simple make, assuming you
74%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host 00:25:4b:bd:24:94 However
74%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
compared with version 1.x are noticeable in Tomoyo versions 2.2.x and 2.3.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel 3.2, which
73%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
the records are destined for the expense or income accounts, and so on. The instruction sheet doesn't need to be a fixed form; instead, it must include keys, indexes, and shortcuts. Figure 3 shows where data
73%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing 3 shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.22
72%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
directories, sets up links, and copies files into the zone to create the new system's layout (Listings 2 and 3). The installation also creates the zone's chrooted directory /zones/web1 and sets the appropriate
71%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
71%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [3] keeps a close eye on your

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice