Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (98)
  • Article (4)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

66%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
in the cgroup. You can then use the tc with the group. Start by defining the classID for the cgroup: echo 0x00100001 > /cgroup/net_cls/libvirt/qemu/guest/net_cls.classid This hexadecimal number comprises two
66%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
, most likely, (3/2) x 15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s 20 instructs sshguard
66%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
support to its Windows Vista and Windows Server platforms in 2007. Linux in all its variants and Apple's Mac OS X followed suit; thus, the new protocol spread with each new installation. On all ... IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your environment
66%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 ! 12 interface eth1 13 ip address 10
66%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
and on several operating systems, but not all combinations. In general, it can discover information about x86/x86_64, RISC-V, and PowerPC, but not on all operating systems. The command runs on Linux, Windows (no
66%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
launched nary 20 years ago (Figure 1). Its underpowered early Atom CPU cannot support a modern graphical environment, but the intended use as a terminal in init 3 mode moots that concern entirely. Sadly, I
66%
Manage your servers with System Center Essentials
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kheng Ho Toh, 123RF.com
-fledged devices. So, if you purchase 20 licenses and need to monitor 20 physical and 30 virtual servers on the network, you can't add any more license packages, because you have reached the upper limit
66%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
. Because it had to run in RAM, extensions were difficult. This situation prompted the two to start working on their own distribution and spawned the development of pfSense [1]. The core of version 2.0 from
66%
A first look at Apache 2.4: Web server for the cloud
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Helder Almeida, 123RF.com
for their documentation. Although at times it's a bit terse, it is very complete. The Apache 2.4 release, although a fairly modest bump compared with the move from the 1.x series to 2.0.x, is a pretty important release
66%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself, which

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice