Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (69)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

26%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
, the MAC address (e.g., 00:11:22:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
26%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.gz cd pen-0.18.0/ ./configure make make install Started with: ./pen -r -p pen.pid -C localhost:4444 -S 3 \ localhost:3306 192.168.56.101:3306:100 \ 192.168.56.102:3306:100 192
26%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
="binary" unique="0" required="0"> 18 19 Location of the Asterisk PBX server binary 20 21 Asterisk PBX server binary 22
26%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
_config 03 bash#> vi sshd_config 04 AllowTcpForwarding no 05 ClientAliveCountMax 3 06 ClientAliveInterval 0 07 Compression delayed 08 LoginGraceTime 60s 09 LogLevel DEBUG3 10 MaxAuthTries 2
26%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
.add(layers.BatchNormalization()) model.add(layers.Conv2D(32, (3,3), padding='same', activation='relu')) model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2))) model.add(layers.Dropout(0.3)) The next
25%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
OS*) 15 PING="ping" 16 PING2="" 17 ;; 18 esac 19 ... 20 21 for i in server1 server2 server3 workstation1 workstation2 22 do 23 $PING $i $PING2 > /dev/null 24 if [ "$?" != "0
25%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
to many administrators by that name. The tool was renamed when version 0.99.1 of Wireshark was released, because Ethereal developer Gerald Combs left Ethereal Software. He launched a successor project under
25%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
:31:40: [6694] DEBUG: (lifebyte = 0:0) 04 2011-01-28 17:31:40: [6694] DEBUG: enctype = 7:7 05 2011-01-28 17:31:40: [6694] DEBUG: (encklen = 128:128) 06 2011-01-28 17:31:40: [6694] DEBUG: hashtype = SHA:SHA 07
25%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
. In the test scenario, I defined a backup schedule with the following settings: Schedule: weekly Daily full backup: Monday – Friday 20:00 Daily incremental backup: Monday – Friday 08:00--18:00, 30
25%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
used a virtual machine on a VMware ESX server. The physical underpinnings were a ProServ II server by ExuS Data with two Xeon quad-core processors and 16GB of RAM (Figure 1, top

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice