Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (750)
  • Article (244)
  • News (23)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 102 Next »

30%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only ... , was designed to help. This article investigates whether IPv6 can provide a full-fledged alternative to IPv4 on today’s networks. Despite my initial euphoria, reality hit me hard during my testing sessions ... Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only ... Autoconfiguring IPv6 Clients ... Autoconfiguring IPv6 Clients
30%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
or humanly readable; for example, iso.org.dod.internet.mgmt and 1.3.6.1.2 refer to the same object, and they can be used as equivalents in queries. SNMPv1 and SNMPv2 use what are known as "communities
30%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
in the standard Python built-ins [2] and in the NumPy library [3]. Figure 1: IPython session comparing two implementations of a round routine. Unless you
30%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
[<-] 334 VXNlcm5hbWU6 [->] Y2hyaXNiaW5uaWUzQGdtYWlsLmNvbQ== [<-] 334 UGFzc3dvcmQ6 [<-] 235 2.7.0 Accepted [->] MAIL FROM: [<-] 250 2.1.0 OK t2fjm4427fd213ply.2523 - gsmtp [->] RCPT TO
30%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
). FreeBSD: x86/64 (64-bit); x86 (32-bit). The following examples were built and run on a Limulus personal cluster running Scientific Linux 6.2 on an Intel i5-2400S with 4GB of memory. If you don
30%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
IP address (1 host up) scanned in 8.47 seconds root@dal01:~# Listing 6 Running Scripts in a Category root@dal01:~# nmap --script malware www.mcwrite.net Starting Nmap 5.00 ( http ... 6
29%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
of these distributions to the test: ClearOS [1], Collax Business Server [2], Koozali SME Server [3], NethServer [4], Univention Corporate Server [5], and Zentyal Server [6]. The seventh contestant was a pre-installed NAS
29%
Safeguard and scale containers
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © cepixx, 123RF.com
recommended for size and safety considerations. Container operators will find a statically linked Go web server with an image size of just 6.7MB. If you need to compile Ruby Gems or Python Eggs
29%
Wireshark
27.11.2011
Home »  Articles  » 
 
An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can ... to the network interface’s link layer. Administrators can control Tcpdump’s behavior at the command line by passing in parameters, including the filters to use. Ethereal and Wireshark Because a command
29%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
, determined an expected value (mean) 1.6ms greater than requested with a standard deviation (sigma) of 0.3ms [7], and reported the range between the minimum and maximum values encountered – handling

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice