Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (579)
  • Article (148)
  • News (41)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 78 Next »

17%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about 12.5MB of new software is installed. Logwatch gets configuration details several ways: from script
17%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
? What future software development takes highest priority for you? SK: We started to use VMware View 4.0 in 2010. Since then, VMware has met many of our wishes, and the product has noticeably improved
17%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
at version 1.0 since it was released – the version number has never been incremented. The toolkit provides configuration defaults for any current operating system. For each build, a baseline is released
17%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
seq_timeout = 10 08 tcpflags = syn 09 command = /usr/sbin/iptables -A INPUT -s \ %IP% -p tcp --dport 22 -j ACCEPT 10 11 [closeSSH] 12 sequence = 9000
17%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
1.1.1.1/10 scope global veth1 valid_lft forever preferred_lft forever $ ss -etn State Recv-Q Send-Q Local Address:Port Peer Address:Port ESTAB 0 0 1.1.1.1:22 1
17%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
$st2->execute($dbh->{pg_pid}); 16 if( !$st2->fetchrow_arrayref->[0] ) { 17 warn "couldn't stop backend PID=$dbh->{pg_pid}\n"; 18 } 19 exit 1; 20 } 21 22 POSIX::sigaction(SIGTERM, POSIX
17%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0 22:40 ? 00:00:00 [o2hb-BD5A574EC8] root 7935 7
17%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
$ module load compiler/open64-5.0 where the first part of the command is the module command, the second part is the module function, and the third part is the module you are loading. To make things easier
17%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
://nmap.org ) at 2021-07-25 22:05 CEST Nmap scan report for metasploitable (192.168.122.236) Host is up (0.095s latency). Not shown: 65506 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23
17%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
; 22 my_record.z = counter + 2; 23 my_record.value = (float) counter * 10.0; 24 /* write out my_record */ 25 } 26 return 0; 27 } One-by-One Initially, I’m just going

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 78 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice