Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm Llorente"478 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (29)
  • News (3)
  • Article (1)
Keywords

« Previous 1 2 3 4 Next »

11%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
09, pg. 90 PowerShell: http://technet.microsoft.com/en-us/scriptcenter/dd742419.aspx
11%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
. The direct patch application success rate rose from 90 percent to 98 percent, and the patch analysis speed improved 50 times. Overall, the solution reduced the workload for an update from one person
11%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
understand how shaping or throttling works with tc: When shaping a 10mbit/s connection to 1mbit/s, the link will be idle 90% of the time. If it isn't, it needs to be throttled so that it IS idle 90
11%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
In KBOut PktOut 05 3 1 1421 2168 0 0 41000 90 0 2 0 0 06 3 2 1509 2198 64 2 49712 109 0 2 0 0 07 3 2 1403 2192
11%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
certificates . An example of a fairly comprehensive certificate check (still without using the full range of options) is: ./check_cert --url checkmk.de --port 443 --not-after 3456000 1728000 --max-validity 90
11%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
send -- "exit\r" 85 expect -exact "exit\r 86 logout\r 87 Connection to aspen closed.\r\r 88 ]0;khess@trapper: ~khess@trapper:~\$ " 89 send -- "^D" 90 expect eof 91 khess@trapper:~$ The parts you
11%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
cheaper than upgrading a processor, it makes sense to investigate the situation upfront. CPU load isn't a problem if it is only short term or only occasionally rises above 90 percent. It does become
11%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
on those attack surfaces that a professional attacker would tend to exploit. IBM refers to a Forrester survey, according to which users of the IBM Randori tool require 90 percent less time for vulnerability
11%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
. In most cases, 90 percent of a full backup will be identical to the previous full backup, so the full backup does not need to be sent to the backup server again. Instead, the backup server creates a backup
11%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f90ae275 08 Contact: Alice 09 ... The media data transferred in the course of a voice or video call are typically transported one

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice