Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (407)
  • Article (67)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 48 Next »

17%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
can manage the whole deployment and hardware configuration with PowerShell commands. For instance, you can create a new machine with the command: > new-vm -Name win8 -MemoryStartupBytes 512MB -Boot
17%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
.tar.gz                                                                          8,473,315 #3    /home/laytonjb/LAPTOP/CLUSTERBUFFER/STRACE_PY/EXAMPLES/23andme-jeff-runs/all2/strace.26702.call_variants_1.out     6,155,298 #4    /home/laytonjb/CLUSTERBUFFER2/STRACE_PY/EXAMPLES/23
17%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... 3
17%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
_domain": "yourdomain.com", 06 "dataset_uuid": "d34c301e-10c3-11e4-9b79-5f67ca448df0", 07 "resolvers": [ 08 "192.128.0.9", 09 "192.128.0.10" 10 ], 11 "max_physical_memory": 4096, 12 "nics": [ 13
17%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
that Puppet cannot detect. A typical example in the Unix environment is the sequence for setting up a service. You have to (1) install the package, (2) adjust its configuration file, and (3) start
17%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
01 auto br0 02 iface br0 03 bridge-ports swp1 swp2 swp3 swp4 swp5 04 bridge-stp on Because the list would be pretty long for 52 ports, you can also do the following specify
17%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
level of TCP streams and UDP datagrams) and 7 (HTTP/application protocols) can be configured comprehensively, whereas the underlying Layer 2 and Layer 3 network (frames and IP packet layers) cannot. Who ... Mesh Service for OSI Layers 2 and 3
17%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
is an interpreted language that is "powerful, fast, lightweight" [2]. It is probably most well known as the scripting language used by the popular game World of Warcraft (WoW) [3]; however, Lua is also used ... 6
17%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
and analyzing network packets are SmartSniff [1], SniffPass [2], and Open Visual Traceroute [3]. In this article, I introduce these three handy utilities and also take a look at Microsoft Message Analyzer, which
17%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
posixaccount /etc/dirsrv/schema/10rfc2307.ldif objectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Standard LDAP objectclass' SUP top AUXILIARY MUST ( cn $ uid $ uidNumber $ gidNumber $ home

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice