Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

8%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
check) or as RC scripts. Listing 2 CUPS Monitoring 01 #! /bin/sh 02 03 while true 04 do 05 06 lpq -Plp | grep -q "lp is ready" 07 08 if [ $? -gt 0 ] 09 then 10 cupsenable lp 11 fi 12
8%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
names as targets. Thus, you could launch a connection scan of ports 0 through 1023 in the lemon.com domain by entering nmap -sT -p 0-1023 www.lemon.com . To scan a whole network, enter the netmask ... 0
8%
Setting up Exchange Server 2010 with SP1
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Francois Lariviere, 123RF.com
the installation, the Exchange management console will appear. Troubleshooting In some situations, the server installation will fail. In this case, you can press Retry to attempt to install the corresponding
8%
Exploring the differences between MariaDB and MySQL
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© iofoto, Fotolia.com
.1.53, with some added bug fixes, additional storage engines, new features, and performance improvements. Versions of MariaDB that do not have an equivalently numbered version of MySQL (e.g., MariaDB 5.2.4) contain
8%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
use only non-destructive methods, however, you might be surprised how far they get. In many cases, they can access what are considered to be secure rooms within just a couple of minutes. Many
8%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
://lxr.free-electrons.com/source/mm/oom_kill.c?v=2.6.32 mm/oom_kill.c: http://lxr.free-electrons.com/source/mm/oom_kill.c?v=3.2 The Author Federico Lucifredi is the maintainer of man(1
8%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
version 2.6.23. To check your system, you can enter the command: uname -r. You'll be on the safe side as of openSUSE 11.0 and Ubuntu 8.04. Additionally, your kernel needs to enable support for dynamic
8%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
-on-LAN [2]. Additionally, you can add multiple connections to a cluster. In this case, all of the connected machines will run any commands you type in parallel. Starter's Gun Because this jack
8%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
this, we will look at an example that may be fictive but is nonetheless not too far from today's practical SaaS applications. Case Study Corporations can outsource the email service to a SaaS provider
8%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), and JiffyBox. In the US, these vendors are joined by providers such as GoGrid, Rackspace, and Terremark ... addresses this issue by offering a standardized API for infrastructure as a service (IaaS) clouds.

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice