Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (147)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 49 Next »

28%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
the hash, for example, with sha1sum for SHA-1: echo -n "magazine" | sha1sum This entry in the users file, ADMIN SHA-Password := "e3d5a52968cef277f476a78124d8e05f1d558953" replaces the one above. One
28%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
, or User scopes). These include custom dimensions: 1. srcaddr 2. dstaddr 3. srcport 4. dstport 5. protocol 6. exporter_id 7. input_if 8. output_if 9. tos and custom metrics: 1. bytes (integer) 2
28%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
is available in the OrientDB wiki [2]. Getting Started The first example is based on characters and books from the Discworld series (Figure 2) written by the brilliant Terry Pratchett, who sadly passed away
28%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
, resilient, and sustainable operations," said Dr. Ben Ashman, navigation lead for lunar relay development, part of NASA's Space Communications and Navigation (SCaN) program (https://www.nasa.gov ... with Lunar Time Zone; Open Source Malware on the Rise, According to Sonatype Report; Six Principles of Operational Technology Cybersecurity Released; New Password Rules Recommended by NIST; OpenSSH 9.9
28%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
.6.24: 1.5-23 05 pve-kernel-2.6.24-11-pve: 2.6.24-23 06 qemu-server: 1.1-16 07 pve-firmware: 1.0-5 08 libpve-storage-perl: 1.0-13 09 vncterm: 0.9-2 10 vzctl: 3.0.23-1pve11 11 vzdump: 1.2-5 12 vzprocps: 2 ... 2
28%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
://github.com/containernetworking/cni/blob/master/SPEC.md Calico networking using Vagrant and the Calico CNI plugin: https://github.com/projectcalico/calico/tree/master/v2.2/getting-started/kubernetes/installation/vagrant CoreOS cloud config: https
28%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
the as-a-service offerings. For example, the Kubernetes-as-a-service offerings, such as Google Kubernetes Engine [1], Amazon Elastic Container Service for Kubernetes (EKS) [2], and Microsoft Azure
28%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
particle[(int) N]; 14 PARTICLE *particles; 15 ... 16 for(i=0;i<N;i++){ 17 particle[i].nxtParticle=(i==N-1)?NULL:&particle[i+1]; 18 particle[i].idparticle=i; 19 } 2. This program either loads some
28%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this: makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \ 1.3.6.1.5.5.7.3.2 -len 2048 -e01
28%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
to see what might be causing the load. Figure 8: Disk stats and top processes. One last option I want to cover is n , for network stats. Figure 9

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 49 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice