Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (173)
  • Article (62)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 Next »

15%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
information. 8. bbFTP Although bbFTP [23] sounds like it's related to BBCP, it's really not. BBCP was developed at SLAC [24], and bbFTP was developed at IN2P3. [25]. bbFTP is something like FTP, but it uses
15%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
protocols, for example, http-brute, oracle-brute, and snmp-brute. default These are standard scripts that are used if you run Nmap with the -sC or -A options. discovery
15%
Wireshark
27.11.2011
Home »  Articles  » 
 
that the administrator can evaluate later. One particularly impressive thing about Tcpdump is its useful collection of filters. These capture filters are based on Libpcap, a C/​C++ library that supports access
15%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
(Accelerated Processing Unit) [4]. This processor combines a CPU with a GPU on a single chip. For example, the recently announced AMD A10-5800K has the following specifications: 4 cores at 3.8GHz (turbo
15%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9 20 # user setup 21 user --name=example-user --password= --iscrypted --gecos="example-user" 22 # Disk partitioning
15%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
IDENTIFIED BY 'ohC3teiv'; 10 EOF 11 mysql -u root <
15%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
(streams 22 (default :ttl 60 23 ; immediate indexing of all incoming events: 24 index 25 26 ; Forward errors, sorted by tags: 27 (where (state "error") 28 (where (tagged
15%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
# and network has converged traceroute -In 10.4.1.25 1 10.3.1.22 # backup VPN # router site 3 2 172.16.1.7 # backup VPN # router site 4 3 10.4.1.25 LAN Failure
15%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
environment provides impressions of the insights Prometheus delivers into a Kubernetes installation. The Prometheus configuration is oriented on the official example [3]. When querying metrics from
15%
Red Hat's cloud and virtualization portfolio
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
.1 of Red Hat Enterprise Virtualization (RHEV) [23] for servers [24] and desktops [25]. In this article, I restrict myself to the innovations that lift RHEV 3.1 to the same level as enterprise virtualizers

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice