Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (613)
  • Article (195)
  • News (14)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 83 Next »

24%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
=casper/vmlinuz,initrd=casper/initrd --extra-args 'console=ttyS0,115200n8' This command is intended as an example. It assumes that a network bridge named br0 is set up on the system and that an ISO image of Ubuntu 24.04 Server is located
24%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
at the output of uptime [1] on OS X:   13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63   The uptime command displays the load average in its common form, averaging the last one, five, and 15
24%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
at the output of uptime [1] on OS X: 13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63 The uptime command displays the load average in its common form, averaging the last one, five, and 15 minutes
24%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
/tmp filex.txt orbit-gdm pulse-PKdhtXMmr18n You can also rename the file when you physically move it: $ mv /tmp/filex.txt file0.txt $ ls Desktop file0.txt list.txt newbie.txt Public Videos
24%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
No a8f5898e-1dc8-49a9-9878-85004b8a61e6 Blocks Win32 API calls from Office macros No 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Deploys advanced protection against ransomware
24%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Manipulation The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application
24%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
   100   100   010    Pre-fail  Always       -       0   9 Power_On_Hours          0x0032   097   097   000    Old_age   Always       -       12441  12 Power_Cycle_Count       0x0032   098   098   000    Old
24%
System 76 Unleashes World's Smallest Quad-GPU Workstation
20.10.2020
Home »  News  » 
.2 gen 2 Type-A ports, 1 USB 3.2 Type-C, 2 RJ-45 LAN ports, 5 audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0 To accommodate such power, System 76 had to put serious work
24%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
. The recommendation for a production environment with high availability would then include six (+n ) physical servers (two openQRM servers, two storage hosts, and two virtualization hosts). Linux is used
24%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice