Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (617)
  • Article (146)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 78 Next »

9%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
clear 03 while true 04 do 05 echo "New record" 06 maxrecord=`ls -1 *.dat | sort | tail -1 | cut -d. -f 1` 07 newrecord=$(echo $maxrecord + 1 | bc ) 08 width=`echo $newrecord | wc -c` 09 10 ... 11 12
9%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
mainlog.info('an informative message') 11 mainlog.warning('a warning') 12 13 mylog.debug('no message from My-Module') 14 mylog.setLevel(logging.DEBUG) 15 mylog.debug('another message from My
9%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0. Multivendor VLANs
9%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
.SharePoint.Search.Administration.SPSearchService,Microsoft.SharePoint.Search,Version=12.0.0.0,Culture=neutral, PublicKeyToken=71e9bce111e9429c" -servicename spsearch Then, change the login name
9%
Tools that extend Bash scripting
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Laschon Maximilian, 123RF.com
the user input # Set bold mode tput bold tput cup 10 15 read -p "Enter Your Choice [1-2] " choice tput clear tput sgr0 tput rc Figure 3: tput sample
9%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
the virtual machine consoles in your browser with phpVirtualBox. Free or Not Free? Up to version 4.0 of VirtualBox, both a commercial and an open source edition (OSE) existed. The OSE often was available
9%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
of the memory: dd if=/dev/fmem of=memory.dd bs=1MB count=512 Another tool for dumping memory is the kernel module crash , which was developed by Red Hat. Just like fmem , crash creates a pseudodevice called
9%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
[inst.id] = inst.state 08 summary[inst.state] += 1 09 state 10 end 11 total = summary.values.inject(0) { |sum, i| sum += i } 12 puts "Found #{total} instances in the following states:" 13 summary
9%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
with TurnKey Linux TurnKey Linux version 13.0 has been available since August 2014. All TKL appliances have been based on Debian since version 12.0; whereas previous versions were based on Ubuntu
9%
Network simulation with GNS3
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Joseasreyes, 123RF.com
reconfiguration and the "gateway device," which can be used to connect a virtual network to a physical network. NetSim 11 [4] (NetSim 12 has been released since this article was written) is a commercial solution

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice