Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 09 Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (114)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

19%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
lockdown: fix support for iOS 5 07 f8f3f299a56aeccce1b978fed7620137f7072518 idevicebackup2: plug a small memory leak 08 ceae1d897597c66c19c2ed30b3049ce09db78233 ideviceimagemounter: remove bogus g_free() 09
19%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
19%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
for a command within a script, as shown in Listing 1. Listing 1 Input Redirection 01 for jobname in $jobs; do 02 for molecule in $mlist; do 03 04 g09 <$molecule.log 05 @$jobname 06 07 $charge
19%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
. In Python 2.3, the logging module [3] was finally added to the standard library, so assuming you have Python in place, you have nothing to install. To use the module, import it at the start of a script, like
19%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
if '__main__' == __name__: 09 10 p1 = Process(target = test, args = ('Rich',)) 11 p2 = Process(target = test, args = ('Nus',)) 12 p3 = Process(target = test, args = ('Geeks',)) 13 14 p2.start
19%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
, POP3, or DNS immediately after installation. The system is extensible thanks to configurable monitors, so administrators can quickly cook up a large collection of monitoring options that don't require
19%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
.redhat.com/app/repo/RPM-GPG-KEY-redhat-beta 07 ggpkey=https://openshift.redhat.com/app/repo/RPM-GPG-KEY-redhat-release 08 enabled=1 09 gpgcheck=1 Next, yum install rhc downloads the client tools to the local machine. Before you can really
19%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
141.20.108.124 07 active_checks_enabled 1 08 passive_checks_enabled 0 09 max_check_attempts 3 10 check_command check-host-alive 11
19%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
at allocation time. Only memory pages in actual use ("dirty") are backed by physical RAM, so the program shown in Listing 1 will have no trouble allocating 3GB of memory on any current machine, almost
19%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
_alg sha encr_alg 3des } 04 p2_pfs 2 05 { 06 label "racoon" 07 local_id_type ipv4 08 local_addr 192.168.1.105 09 remote_addr 192.168.1.7 10 } You still need the Phase 2 definition from

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice