Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (193)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 20 Next »

25%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
is as follows: tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12.34.56.78 flowid 1:12 You'll be glad to know the filter's config is much simpler than the classes or the qdisc
24%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
/2001/XMLSchema-instance" 05 xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-2.0.xsd 06 http
23%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
developers pulled the plug, first placing kqemu under the GPL and finally dropping it entirely in favor of KVM. As of version 0.10.0, Qemu officially supports KVM, and as of version 0.12.0, kqemu is history
23%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
-host-alive' command definition 09 define command{ 10 command_name check-host-alive 11 command_line $USER1$/check_ping -H $HOSTADDRESS$ -w 3000.0,80% -c 5000.0,100% -p 12 5 13
23%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
the Downloads page to a mirror, you might be overwhelmed by the list of innumerable files (Figure 1). Normally, however, all you need is the approximately 100MB ISO image, pfSense-2.0-RELEASE-i386.iso.gz, from
23%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
processor cores. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000, including 12 months of free upgrades, news, and information. For server virtualization newcomers, Citrix
23%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
can exclude files of a certain size (e.g., those of 0MB). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size = 0 Mb
22%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
XPS13 laptop: 13.3-inch screen with edge-to-edge glass (1366x768 resolution), i7 2GHz Intel Core2 Duo processor, 4GB of RAM, and 256GB SSD, all in a 0.88x12.56x9.3-inch device weighing 2.99 pounds
22%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.0-openjdk 02 # echo $JAVA
22%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple

« Previous 1 2 3 4 5 6 7 8 9 10 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice