Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3%A9n Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (70)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

46%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
,GotoIf($["${wl}" = "1"]?found:notfound) 05 exten => _.,n(notfound),agi,captcha.sh 06 exten => _.,n,Playback(to-call-num-press) 07 exten => _.,n,SayDigits(${captcha}) 08 exten => _.,n,Read(usercaptcha||3|1|) 09 exten
46%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
Euler Intelligence. All enterprise Linux developers face a common problem. The Linux mainline kernel releases an update every 9-10 weeks, with each update containing 2,000-3,000 patches. Most enterprise organizations
46%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
– A common language makes the script portable to Nmap systems on other platforms. (A Bash script, on the other hand, would work well in Linux but might not work on a Windows system.) Community
46%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
thus assumed an upgrade scenario that included replacing the motherboard with on-board graphics and sound, the CPU, the RAM (1,024MB), and the hard disk (320GB). After investigating prices, the authors ... 3
46%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
actions it sees during that time – all other actions are denied. Versionitis Back in 2003, Japan's NTT Data Corporation (a subsidiary of Japanese telecommunications giant Nippon Telegraph and Telephone ... 9
45%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), and JiffyBox. In the US, these vendors are joined by providers such as GoGrid, Rackspace, and Terremark
45%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
45%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
version [9]. Listing 3 /etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.3 255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
45%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
on the following item: cmd(2208)? [Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"): Y The process will end immediately on receipt of the Stop-Process signal. To run a CMD process ... 9
45%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
. Haeberlen, "A Case for the Accountable Cloud," Proceedings of the 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware , 2009. B. Hay and K. Nance, "Forensics Examination

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice