Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3!600 Llorente"22 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (79)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

43%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/" 20 21 echo $newid >> vm-list.txt 22 23 echo "cloning finished, starting vm" 24 virsh start $vmname
43%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
will be accepted through April 10, 2011. Look for more on the Contegix website http://www.contegix.com/. Icinga v1.3.0 Released with Dual-Stack Support By now ... 3
43%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
is not accessible! ****************" >> dba.log 15 /usr/local/etc/rc.d/002pgsql.sh start 16 sleep 15 17 psql -U monitor -d monitor -c "select * from watch;" 18 19 if [ $? -eq 0 ]; 20 21 then 22
43%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
() 15 p1.start() 16 p3.start() 17 18 p1.join() 19 p2.join() 20 p3.join() To see that multiprocessing creates multiple subprocesses, run the code shown in Listing 2 (counting
43%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard ... 3
43%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
141.20.108.124 07 active_checks_enabled 1 08 passive_checks_enabled 0 09 max_check_attempts 3 10 check_command check-host-alive 11
43%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
20 21 22 23 24
43%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
using? 07 1) ANSI Standard CRT 08 2) DEC VT100 09 3) PC Console 10 4) Sun Command Tool 11 5) Sun Workstation 12 6) X Terminal Emulator (xterms) 13 7) Other 14 Type the number of your choice
43%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
and documentation on the topic of server performance monitoring. If you manage a complex structure, it's good idea to read the guides on this site. To run the tool, you also need Log Parser 2.2 [2], which is also
43%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
-tuxgeek.rhcloud.com,174.129.129.190' (RSA) to the list of known hosts. 20 Enter passphrase for key '/home/tscherf/.ssh/libra_id_rsa': 21 Confirming application spaceuploader is available 22 Attempt # 1 23 24 Success

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice