Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (132)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

38%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
://www.microsoft.com/en-us/office365/deployment-support.aspx Exchange Autodiscover: http://www.msxfaq.de/e2007/autodiscover.htm Office 365 e-book download: http://download.microsoft.com/download/1/2/F/12F1FF78-73E1-4714-9A08-6A76 ... 6
38%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
38%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
37%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
and Curl up front. On Debian/Ubuntu you can prepare the system for the RVM installation by typing: apt-get install curl git-core If you follow the official "Quick Installation" method [6], you then call ... 6
27%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
:%02x%02x\n' 19 83 20 235 Note that 6to4 relays (the machines that handle your traffic) use the anycast address of 192.88.99.1 (2002:c058:6301::), so finding out who is actually handling your traffic ... Transitioning from IPv4 to IPv6 will be messy; we describe IPv6 served three ways. ... IPv6 ... IPv6 and Linux
18%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
[2] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.0 release [3 ... vSphere 5 vs. XenServer 6
13%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
of development, the programmers released version 1.0 of OCFS2, and it made its way into the vanilla kernel (2.6.16) just a year later. Version 1.2 became more widespread, with a great deal of support from various ... The vanilla kernel includes two cluster filesystems: OCFS2 has been around since 2.6.16 and is thus senior to GFS2. Although OCFS2 is non-trivial under the hood, it is fairly simple to deploy.
11%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
the biggest rentable cloud today: the Amazon Web Service. On the basis of this extremely mature technology, Citrix launched version 5.6 of its XenServer product family in May 2010. XenServer, the product built ... Version 5.6 of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
11%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
.34.56.78 -oN filename If you want screeds of detail, then it's also simple just to add the verbosity switch (twice for even more detail): # nmap -vv -sS 12.34.56.78 To truly avoid detection (in conjunction
11%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
); i+= 4096) newblock[i] = 'Y'; 12 printf("Allocated %d MB\n", allocation); 13 } 14 } Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice