Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (399)
  • Article (115)
  • News (20)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 54 Next »

9%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host 00:25:4b:bd:24:94 However
9%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
-server"})) 06 07 ; Enable all interfaces for TCP, UDP and websockets: 08 (let [host "0.0.0.0"] 09 (tcp-server {:host host}) 10 (udp-server {:host host}) 11 (ws-server {:host host})) 12 13 ; Clean up events
9%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
,048 0.776039 22.137891 1.612694 10.652902 0.199173 86.256026 0.455025 37.755903 4,096 5.855209 23.472936 12.275261 11
9%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
9%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
as reliably as the rest of the PKI world. 4. Protocols A public website must support the TLS 1.0, TLS 1.1, and TLS 1.2 protocols. SSL 2 is obsolete and insecure. SSL 3 is also deprecated and, although
9%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
Oracle’s free VirtualBox virtualization solution is intended for use on the desktop. Management of virtual machines is via a GUI that only works
9%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
and interacts with a remote filesystem as though it were local (i.e., shared storage). It uses the SSH File Transfer Protocol (SFTP) between hosts, so it’s as secure as SSH. (I’m not a security expert, so I can
9%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
,1000); 06 07 // Set host data on the Device (GPU) 08 dA = gpuSetData(A); 09 dC = gpuSetData(C); 10 11 d1 = gpuMult(A,B); 12 d2 = gpuMult(dA,dC); 13 d3 = gpuMult(d1,d2); 14 result = gpuGetData(d3); // Get
9%
Service Management Facility (SMF) in OpenSolaris
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Steve Cukrov, Fotolia.com
– Shut down system without powering off s/S milestone:/single-user:default Single-user mode with partially mounted filesystem 1 – Like s, root login only
9%
Blending Java with other programming languages
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
import java.io.*; 04 import java.util.*; 05 06 public class Readline { 07 08 [...] 09 10 public static final void load(ReadlineLibrary lib) throws UnsatisfiedLinkError { 11 [...] 12 System

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice