Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (111)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

65%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
, which makes for a ridiculously large address space, although back when IPv4 was created, I'm sure they thought the same thing (see the "IPv6 Logging" box). IPv6 Logging For any logging of network
64%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
-Post: 08 List-Help: 09 List-Subscribe: 10 List-Owner:
64%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
for a command within a script, as shown in Listing 1. Listing 1 Input Redirection 01 for jobname in $jobs; do 02 for molecule in $mlist; do 03 04 g09 <$molecule.log 05 @$jobname 06 07 $charge
62%
Continuous integration with Jenkins
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© braverabbit, 123RF.com
't even ask for a paycheck, because I'm talking here about Jenkins, the butler – some readers may know him as Hudson. Jenkins [1] is a web-based Java application that runs in any modern servlet container
62%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
.0" encoding="utf-8"?> 1 This completes the "Hello World" example
62%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
, a request like http://www.example.com/index.html?file=/etc/passwd would trigger the sample rule in line 8. Then the action defined in line 9 would block the request. The client sees an HTTP 403 Forbidden
60%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x  0 laytonjb laytonjb 31897275 Dec 31  1969 DATA1 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2 09
60%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
if '__main__' == __name__: 09 10 p1 = Process(target = test, args = ('Rich',)) 11 p2 = Process(target = test, args = ('Nus',)) 12 p3 = Process(target = test, args = ('Geeks',)) 13 14 p2.start
60%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
. In combination with the configuration management tools, such as Puppet [8], MCollective is an extremely powerful but easy-to-handle system management tool. Thanks to its middleware approach, MCollective
60%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
/app/repo/RPM-GPG-KEY-redhat-beta 07 ggpkey=https://openshift.redhat.com/app/repo/RPM-GPG-KEY-redhat-release 08 enabled=1 09 gpgcheck=1 Next, yum install rhc downloads the client tools to the local machine. Before you can really

« Previous 1 2 3 4 5 6 7 8 9 10 ... 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice