Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22%390 Llorente 22 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (50)
Keywords

« Previous 1 2 3 4 5 Next »

45%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/" 20 21 echo $newid >> vm-list.txt 22 23 echo "cloning finished, starting vm" 24 virsh start $vmname
45%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
persist-key 18 persist-tun 19 client-config-dir /etc/openvpn/ccd 20 ccd-exclusive 21 status /var/log/openvpn/status.log 22 log-append /var/log/openvpn/openvpn.log 23 verb 5 The important thing here
45%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
:web1> commit 20 zonecfg:web1> exit The next step after configuration is to install the zone, which takes the information from your configuration file (/etc/zones/web1.xml ), creates default
45%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
45%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
) or Link Layer Discovery Protocol (LLDP). Disable Internet Protocol (IP) source routing. Disable Secure Shell (SSH) version 1. Ensure only SSH v2.0 is used with the following cryptographic
45%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
launched nary 20 years ago (Figure 1). Its underpowered early Atom CPU cannot support a modern graphical environment, but the intended use as a terminal in init 3 mode moots that concern entirely. Sadly, I
45%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
, specifying the relationships between projects, their build configurations (e.g., Debug or Release ), and target platforms (e.g., Any CPU or x64 ). The file also stores global solution settings, including
45%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
-tuxgeek.rhcloud.com,174.129.129.190' (RSA) to the list of known hosts. 20 Enter passphrase for key '/home/tscherf/.ssh/libra_id_rsa': 21 Confirming application spaceuploader is available 22 Attempt # 1 23 24 Success
45%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
, to monitoring and controlling complete systems. Identifying Services OpenNMS can automatically identify the services you need to monitor. In versions up to 1.8.x, this task is handled by the capabilities daemon
44%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
. In the test scenario, I defined a backup schedule with the following settings: Schedule: weekly Daily full backup: Monday – Friday 20:00 Daily incremental backup: Monday – Friday 08:00--18:00, 30

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice