Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1321)
  • Article (314)
  • News (201)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 184 Next »

53%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
12
53%
Taming Change in the New Era of Computing
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
12
53%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
GKF8S 16 DDR3, Registered, ECC, 4 rank 8.710 0.54 AL24M72E4BKH9S 8 DDR3, Registered, ECC, 2 rank 6.132 0.77 AL12M72B8BKH9S ... 6
53%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
requirement, it might be more prudent to resort to an event-based simulator (e.g., SimPy [6]), which is able to accommodate a broader class of probability distributions. The trade-off is that this takes longer ... 6
53%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
#auto eth0 06 #iface eth0 inet dhcp 07 auto br0 08 iface br0 inet dhcp 09 bridge_ports eth0 10 bridge_stp off 11 bridge_maxwait 5 12 post-up /usr/sbin/brctl setfd br0 0 Next, create a directory ... 6
52%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
://www.microsoft.com/en-us/office365/deployment-support.aspx Exchange Autodiscover: http://www.msxfaq.de/e2007/autodiscover.htm Office 365 e-book download: http://download.microsoft.com/download/1/2/F/12F1FF78-73E1-4714-9A08-6A76 ... 6
52%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
the Nmap downloads page [6] . Understanding Nmap Scripts Nmap organizes the scanning process into five phases (Figure 1). NSE scripts fall into categories associated with the phases of the scanning ... 6
52%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
52%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
52%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
another could allow the user to set up memory of between 1 and 8GB in increments of 512MB. The Deltacloud API bundles all these possibilities into hardware profiles, which means the clients are provided ... 6

« Previous 1 2 3 4 5 6 7 8 9 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice