Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (564)
  • Article (147)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 75 Next »

16%
A web application with MongoDB and Bottle
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Egor Arkhipov, 123RF.com
) The call in line 6 of the survey.py file creates a connection object for communicating with the MongoDB service on the same system on which the web framework is running. Lines 7-8 of Listing 3 then define
16%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure 3). Figure 3: Scheduling the replication
16%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [3] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
16%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
the records are destined for the expense or income accounts, and so on. The instruction sheet doesn't need to be a fixed form; instead, it must include keys, indexes, and shortcuts. Figure 3 shows where data
16%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
Phone 3G, provided with router advertisements in our WLAN test, sent a DHCPv6 request and asked for the name server. However, a Snow Leopard client only evaluates the flags in the router advertisements ... Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only LAN ... IPv6 ... Tested: Autoconfiguring IPv6 clients
16%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
5) and for iptables (Listing 6). Your mileage may vary. Listing 6 Iptables Start and Stop Commands start_command = /sbin/iptables -I INPUT -s %IP% -p tcp --dport 22 -j ACCEPT stop
16%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
Linux Containers (LXC) [1] and Docker [2], as well as software-defined network (SDN) solutions [3], make extensive use of Linux namespaces, which allow you to define and use multiple virtual
16%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
filesystem (AFS) is another network filesystem that is available in a free implementation, OpenAFS [3]. On the other hand are cluster filesystems. Before computers can access "distributed" data, they first ... The vanilla kernel includes two cluster filesystems: OCFS2 has been around since 2.6.16 and is thus senior to GFS2. Although OCFS2 is non-trivial under the hood, it is fairly simple to deploy.
16%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
.own lib/atlas/3.8.4 mpi/mpich2/1.5b1-open64-5.0 module-cvs mpi/openmpi/1.6-gcc-4.4.6 [laytonjb@test1 ~]$ modules list No Modulefiles Currently Loaded. [laytonjb@test1
16%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice