Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3 00 Llorente"425 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (60)
  • Article (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

42%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
01 $ ar -tv Adaptec_Inc_bootbank_scsi-aacraid_5.0.5.1.7.28700-1OEM.500.0.0.406165.vib 02 --------- 0/0 1356 Jan 1 01:00 1970 descriptor.xml 03 --------- 0/0 2122 Jan 1 01:00 1970 sig.pkcs7 04
42%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
://www.example.com creates 30 concurrent users to hit the site. The stats you get back are useful: Lifting the server siege... done. Transactions: 422 hits Availability: 100.00 % Elapsed
42%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
42%
Veeam Agent for Linux backup software
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
to occur every night of the week at 3:00am. This involved backing up an entire Ubuntu installation in a bootable image on network-attached storage (NAS) in the local network (Figure 3). When backing up
42%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
. The second number is percent CPU load from the system (0.3%sy), and the next is percentage of jobs that are "nice" [2] (0.0%ni). After that, Top lists percent overall CPU time idle (86.3%id; four real cores
42%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
buffered disk reads: 616 MB in 3.00 seconds = 205.03 MB/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292 MB in 2.00 seconds = 3153.09 MB/sec If this were a spinning disk, you would also
42%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
in 2014. At the time of writing, the available Kea versions were 2.2.0 (July 2022, Current-Stable) and 2.3.6 (March 2023, Experimental-Development). Most distributions have prebuilt Kea packages
41%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
41%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
-fastcgi are running, as expected. Listing 1 Process List root 589 0.0 0.3 142492 3092 ? Ss 20:35 0:00 nginx: master process /usr/sbin/nginx -g daemon on; master_process on; www
41%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
, the problem of writing a dump to an MD RAID or transferring larger kernel images ultimately proved unfixable. Further attempts with Netdump (Red Hat) or Diskdump [3] in 2002 and 2004 also had only moderate

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice