Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22!490 Llorente"5432 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (40)
Keywords

« Previous 1 2 3 4 Next »

72%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
:web1> commit 20 zonecfg:web1> exit The next step after configuration is to install the zone, which takes the information from your configuration file (/etc/zones/web1.xml ), creates default
72%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
72%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
, Mac OS X, and Solaris), and it supports a wide number of guest systems, including exotics such as DOS/WIN 3.1 and OS/2. Installing VirtualBox is easy on any platform because it usually only involves
72%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
-address remotelan; 16 application any; 17 } 18 then { 19 permit; 20 } 21 } 22 } You need to define trustnet and remotelan in the zone address book because Juniper only processes
72%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
, to monitoring and controlling complete systems. Identifying Services OpenNMS can automatically identify the services you need to monitor. In versions up to 1.8.x, this task is handled by the capabilities daemon
72%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
_copied=copy_to_user(user,hello_world,to_copy); 19 return to_copy-not_copied; 20 } 21 22 static struct file_operations fops = { 23 .owner= THIS_MODULE, 24 .read= driver_read, 25 }; 26 27 static int __init mod_init( void ) 28 { 29
72%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/" 20 21 echo $newid >> vm-list.txt 22 23 echo "cloning finished, starting vm" 24 virsh start $vmname
72%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 { 22 System
71%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
-tuxgeek.rhcloud.com,174.129.129.190' (RSA) to the list of known hosts. 20 Enter passphrase for key '/home/tscherf/.ssh/libra_id_rsa': 21 Confirming application spaceuploader is available 22 Attempt # 1 23 24 Success
71%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
: tscherf@TUXGEEK.DE 15 SASL SSF: 56 16 SASL data security layer installed. 17 dn: uid=TScherf,ou=People,dc=tuxgeek, dc=de 18 givenName: Thorsten 19 sn: Scherf 20 loginShell: /bin/bash 21 uidNumber: 9999 22

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice