Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (68)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

36%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
/log/auth.log -w friend.example.com The preceding command puts all the IP addresses that resolve to the DNS name friend.example.com on the list. If you have a large LAN, the sshguard command can quickly become
36%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
server as you can access the Red Hat Network or software packages hosted by a web server. Pulp [1] doesn't act as a proxy between the clients and the various repositories; instead, it mirrors the packages
36%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
correcting block code, named after its inventor Hamming, which was originally developed for cleaning up read errors from punch cards. It is a complex process that involves computing parity codes against
36%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions ... 1
36%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
to suit the customer's needs. Table 1 Basic Data Name OpenNMS Zabbix   Icinga Nagios URL http://www.opennms.org http://www.zabbix.com
36%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
. Table 1 MobaXterm Plugins Plugin Name Function Emacs The cult editor for Unix admins. Fontforge A powerful font editor. Gcc, G++, and development tools
35%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
names as targets. Thus, you could launch a connection scan of ports 0 through 1023 in the lemon.com domain by entering nmap -sT -p 0-1023 www.lemon.com . To scan a whole network, enter the netmask
35%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
startpage in the project directory; this step creates two new files (Listing 1). Listing 1 New Features of Integrated Generator 01 cucumber-nagios-gen feature www.xing.com startpage 02
35%
Agile system management in large-scale environments with Func
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
bowie15, 123RF
on Fedora to work. If you have Red Hat Enterprise Linux or CentOS, you'll need to set up the EPEL repository: # cobbler repo add --name=el-5-x86_64-epel --mirror=http://download.fedora.redhat.com/pub/epel/5
35%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
INTO Friend VALUES (Name ='Peter', Age = 52)", SonesGQLConstants.GQL); C# users can also build a request with special features, but this quickly leads to unintelligible spaghetti code, even for simple queries

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice