Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (34)
Keywords

« Previous 1 2 3 4 Next »

96%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
.g., 100 for VLAN 100). Type a 1 as the tunnel assignment ID to define a tunnel session ID. You need to configure the same settings for restricted network access; that is, you specify the VLAN ... 2012
96%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
.g., 192.168.0.0/24). # tcpdump net 192.168.1.1/24 Src, dst Only capture packets from a source or destination. # tcpdump src 192.168.100.234# tcpdump dst 10.10.24.56 host ... 2012
96%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
/loadavg/ [3]: 1.00 0.97 0.94 1/1279 7743 The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID ... 2012
96%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
January 2012 through March 2012. According to the report, 6 million new malware samples were created in the first quarter of 2012. The announcement states that "Trojans set a new record as the preferred ... 2012
96%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
Hat's Solutions Architect was also a very helpful resource. We tested Red Hat Satellite Server over a three-month period, with Satellite Server installed on an HP Proliant DL380 G5 Server, using RHEL 6 ... 2012
96%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
map for a setup consisting of six OSDs (i.e., individual storage devices in servers) distributed over three racks: crushtool --num_osds 6 -o crush.example.map --build host straw 1 rack straw 2 root ... 2012
96%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
to technical computing 06 | | | | | | |/ _` | | 07 | | |_| | | | (_| | | Version 0.0.0+86921303.rc6cb 08 _/ |\__'_|_|_|\__'_| | Commit c6cbcd11c8 (2012-05-25 00:27:29) 09 |__/ | 10 ... 2012
96%
Top three HPC roadblocks
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Alexey Bogatyrev, 123RF.com
-hanging fruit, for which fewer than 100 cores can have a huge economic effect, why does the HPC market focus on benchmark results that require tens of thousands of cores? Perhaps the belief that "press release ... 2012
96%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should ... 2012
95%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
on the Internet, comfortably surpassing the mark of 100 million websites some time ago, so I hope you'll find that these examples are applicable to a multitude of scenarios. Myths and Folklore A common ... 2012

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice