Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (138)
  • News (2)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 15 Next »

26%
Taking that Unix and Linux feeling tothe Windows desktop with MobaXterm
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Henner Damke, 123RF.com
commands. If necessary, support for remote login and the use of popular remote tools on Linux machines are also available. On the other hand, Windows users who are ready to make the switch to Linux can
26%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
to connect to the remote host with ssh. (6) expect – Wait for "(yes/no)? " in the output. This is the end of the several-line output about host key exchange. (7) send – Send the string "yes" plus
26%
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 2011 PR NEWSWIRE
SAN also comes with new setup wizards and scheduler improvements, as well as remote backup features and up to 1,000 snapshots per storage array – meaning small and medium-sized businesses can be as confident
26%
Give your servers the once over with Nmap
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© ragsac, 123RF.com
|filtered when it can't make a decision about which of the two is correct. Sample To avoid prosecution for attacking someone else's remote server, I'll turn to the man pages for Nmap (using man nmap) to retrieve
26%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
Virtual private networks (VPNs) have established themselves as a standard solution for convenient remote access to enterprise networks. However, they can cause some issues in combination
26%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
Shell Execution Policy to RemoteSigned at the end of the installation. To do this, right-click the VMware vSphere PowerCLI icon at the end of the installation and select Run as administrator . The Set
25%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
on Mac OS X and OpenBSD. To check out my Ubuntu 11.04 laptop's /bin caching status, I enter: $ ./vmtouch /bin Vmtouch crawled the files in /bin and reported that about half of the memory pages
25%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
ubiquitous that even my laptop can act as a VMware or Xen host. I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
25%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
swapping well, and a laptop might hibernate (suspending to disk leverages swap area storage). On servers, swap mostly ensures that intermittent conditions will not cause a crash, as performance constraints
25%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
exists but is disabled. For example, if you want enable the Windows Firewall Remote Management (RPC) rule, you can use the command: set rule "Windows Firewall Remote Management (RPC)" new enable

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice