Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm&123%2009 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (47)
  • Article (22)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

28%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
"; ## SECRET-DATA 13 } 14 gateway remote-racoon { 15 ike-policy test123; 16 address 192.168.1.7; 17 no-nat-traversal; 18 external-interface ge-0/0/0.0; 19 } 20 } 21
28%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
backups are created faster. Duplicity is licensed under the GNU GPL and thus can be used free of charge. Duplicity is tailored for Linux and other Unix operating systems, such as BSD or OS X. Most major
28%
Developing RESTful APIs
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © bowie15, 123RF.com
communication, the developer needs to define how the machine interprets the data in the form of specifications. Back in 2000, Roy T. Fielding, in his highly readable thesis [2], called for a drive to establish
28%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
18 19 Modules pm_buffer 20 MaxSize 102400 # 100 MByte buffer on the hard disk 21 Type disk 22 23 24 25 Modules om_udp 26 Host GraylogServerName 27 Port
28%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself
28%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
http://opennebula.org/repo/ openSUSE/12.3/stable/x86_64 opennebula zypper refresh zypper install opennebula zypper install opennebula-sunstone For Debian and Ubuntu, a tarball is available with several
28%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
: Asymmetrical routing can be relatively easily avoided with namespaces. In practice, virtual veth<x> network devices are fairly typical for network namespaces. Whereas a physical device can only exist
28%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Sun Jul 25 20:12:28 2021 from 192.168.122.1 [mfeilner@parrot][~] $ telnet 192.168.122.236 21 Trying 192.168.122.236... Connected
28%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
": [ 16 { 17 "GroupName": "RND-Admins" 18 } 19 ] 20 }, 21 { 22 "Path": "/", 23 "UserName": "guido", 24 "Arn": "arn:aws:iam::123456789:user/guido", 25
28%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
mailboxes (Standard Edition) Free up to 20 mailboxes; EUR23 per mailbox one-off, at least 25 mailboxes must be licensed. Free Support Software maintenance in first year, free, can

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice