Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 0mbén Llorente"5432 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

32%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
686 oprofile-0.9.5-4.fc12.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
32%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0
32%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
32%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
32%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
run the tool with the -a option, it creates the matching device mapper files: $ kpartx -l ff-clone7.img loop0p1 : 0 20969472 /dev/loop0 2048 $ kpartx -a ff-clone7.img $ kpartx -l ff-clone7.img loop0p1
32%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
.reset_stats= 04 blkio.io_queued=Total 0 05 blkio.io_merged=Total 0 06 blkio.io_wait_time=Total 0 07 blkio.io_service_time=Total 0 08 blkio.io_serviced=Total 0 09 blkio.io_service_bytes=Total 0 10
32%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
server PING server: 56 data bytes 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=0. time=0.415 ms 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=1. time=0.215 ms 64 bytes from
32%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
a line like this: 1269925389.847294 write( 17, " 37989 2136595 2136589 213" ..., 3850) = 3850 <0.000004> This single line has several interesting parts. First, the amount of data written appears after
32%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
32%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
)*   Julia Python MATLAB Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice