Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%2222%A9n Llorente"523 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (60)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

46%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
master.cf 01 mlmmj unix - n n - - pipe 02 flags=DORhu user=mlmmj argv=/usr/bin/mlmmj-receive -F -L /var/spool/mlmmj/$nexthop/ Finally, you need to tell
46%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
../smbtatools-1.2.2 Next, make and make install the compiler package and copy the programs to the correct location. To start the daemon, type smtad -u -n which tells the daemon (u) and the client (n
46%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
="" 04 PING="ping -c1 -w 3" 05 PING2="" 06 07 case $OS in 08 HP-UX*) 09 PING=ping 10 PING2="-n 1" 11 RSH="remsh" 12 RSH2="-l user" 13 ;; 14 Sun ... 2
46%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
In issue 9, I talked about swap memory and how it should be used as a buffer to protect your servers from running out of memory [1]. Swapping is nearly always detrimental to performance, but its
46%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
Chris Buechler and Scott Ullrich were unhappy. Although the FreeBSD m0n0wall distribution gave them a quick option for setting up a firewall and a router, it was designed for use on embedded systems
46%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
is sent to the multicast address ff02::2 (all routers on the local LAN segment.) All IPv6 routers on the network reply with a Router Advertisement. Depending on the flags in the advertisement, the client
45%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
countless IRC server variants. Almost all originate from the original code, which is still in use today on IRCNet [1] and comes closest to the original IRC RFC [2]. Additionally, you will find a plethora
45%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this, the topic is still largely overlooked and a huge amount
45%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
, and IZES Institut für ZukunftsEnergieSysteme (Institute for Future Energy Systems) GmbH [1] [2] investigated precisely this topic. The question the researchers set out to answer was: How economical
45%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice