Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12%A9n Llorente"22 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (76)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

69%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
example, Mar 25, 2011, PrivateKeyEntry, 33 Certificate fingerprint (MD5): AC:D5:CB:5C:13:9D:EF:F2:85:6B:AB:89:49:F8:48:3A Finally, to enable the web connector's HTTPS port, you need to add
68%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
OpenShift one step closer to the west coast of the United States, I think, and I forget about running to explain what OpenShift is all about. OpenShift is a platform-as-a-service (PaaS) cloud service
68%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
67%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
expect { 09 "(yes/no)? " { 10 send "yes\r" 11 exp_continue 12 } 13 14 "word:" { 15 send "whatever\r" 16 send_tty "Key exchange needed with $host\n" 17 exp_continue 18
67%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
25-E SSD [9] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks 3.3.1-MPI [11] Iozone [12] Daemon ... 9
65%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions
65%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
339.78 144.00 307.66 Total   9,262.97 12,094.00 12,325.79 Conclusion Satellite Server offers an automated way of providing patches ... 9
64%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
backup_active = 1 05 backup = 192.168.1.232 06 heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14
63%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
_world[]="Hello World\n"; 08 static dev_t hello_dev_number; 09 static struct cdev *driver_object; 10 static struct class *hello_class; 11 static struct device *hello_dev; 12 13 static ssize_t driver_read( struct file
63%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice