Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (179)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

56%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
populated unit with one drive (1, 2, or 3TB of total storage capacity); and a fully populated unit with two drives (2, 4, or 6TB of total storage capacity) for immediate RAID mirroring data protection
56%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
your average packet size is. Tools such as Snort [2] will run for a few minutes and offer detailed data about your networks protocol usage. Ntop [3] is another example that will also give information
56%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit ... 6
56%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
[3]. Table 1 Currently Available Tomoyo Versions Tomoyo Linux Version Kernel Version Availability (among others) 1.8.x 2.4.37, 2.6.27 through 2.6.39, and 3
56%
News
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
ranking the top 25 worst passwords in order of how commonly they are used. Here are the top ten: 1. password 2. 123456 3. 12345678 4. qwerty 5. abc123 6. monkey 7. 1234567 8. letmein 9. trustno1 ... 6
56%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
.5-23 05 pve-kernel-2.6.24-11-pve: 2.6.24-23 06 qemu-server: 1.1-16 07 pve-firmware: 1.0-5 08 libpve-storage-perl: 1.0-13 09 vncterm: 0.9-2 10 vzctl: 3.0.23-1pve11 11 vzdump: 1.2-5 12 vzprocps: 2.0.11-1dso2
56%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
confirm that the kernel and kernel-debuginfo packages have the same version number: rpm -q kernel-PAE kernel-PAE-debuginfo oprofilekernel-PAE-2.6.32.10-90.fc12.i686 kernel-PAE-debuginfo-2.6.32.10-90.fc12.i
56%
Zarafa on the Univention Corporate Server
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Andres Rodriguez, 123RF.com
or by LINET Services. Setting Up Zarafa4ucs The following section relates to the use of the Zarafa integration kit on UCS 2.3 and 2.4 with Zarafa 6.40. The release of UCS 3.0, including Samba4 support, which ... 6
55%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
this writes an LVM label and some metadata to the PV. The PV is divided up into units of the same size (4MB by default) known as physical extents (PEs). A PE is the smallest allocatable data volume. Figure 1
55%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
: plug another memory leak 05 c90fc4c934ac7b024c1fc1813bb3cffb5333e18f lockdown: move writing of device uuid to client struct inside lockdownd_client_new() 06 f0487376671ffd6ac3fc121657f1fbd0acea3cb0

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice