Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: opens ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (275)
  • News (25)
  • Article (9)
Keywords

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

24%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
can call Strace: strace -e trace=open -o mutt.trace mutt This command line sends all open syscalls for the Mutt application to the /tmp/mutt.trace output file. Then, you can easily grep
24%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
such as SixXs.net [1]. Alternatively, you can build an IPv6-in-IPv4 tunnel to the server you want to configure, which is possible within an OpenVPN connection. To allow this to happen, you need to ask your
24%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
to download the files. Now open up a web browser and look at the results of the warnerbros.html file (see Figure 3). Figure 3: Metagoofil results. w
24%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
that leads to these weird log entries is described in the Squid wiki [4]. The title, "The gory details," sums it up: 1. The client opens a connection to the proxy and issues a request without any
24%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
technology of last resort, described in RFC 4380, is Teredo [4]. As an open source solution, Miredo is available. If an IPv6 target address is explicitly specified, bubble packets are exchanged with external
24%
IO500
02.02.2025
Home »  HPC  »  Articles  » 
or development teams do this, but I’m willing to bet they use their own internal benchmarks. Now, an open source filesystem has contributors that use standard TOP500 benchmarks for writing patches that affect
24%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
 think that additional or different commands should be on the list. I expect this level of disagreement and welcome it, because it always opens up fun discussions (define “fun” however you like). My list
24%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
appear to need updates, as supported by open issues on GitHub. However, it still produces useful output. gpufetch The author of cpufetch  also wrote gpufetch . As you can imagine, it’s designed
24%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
a second. Plus, the financial outlay is zero thanks to the Apache open source license. On the downside, though, all the software really offers is unit testing (aka module testing or component testing
24%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
and configuration data for the virtual server. Finally, you will see a summary and can start the move by pressing Finish . You can also script this process. To do this, open a PowerShell session on the source server

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice