Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 201 Next »

18%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
in Figure 4. To prevent this change, configure Root Guard on the port on Switch C that points in the direction of Switch D. Root Guard disables the switch port once it receives a BPDU with too low of a bridge
18%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
for SDNs. The first version was launched in 2019 with a minimal but ready-to-use distribution for white-box switches. Stratum opens access to various innovative SDN interfaces, such as P4Runtime and Open
18%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
balancers offer support for multiple OSI layers. What sounds dull in theory has significant implications in practice. Most software load balancers for Linux operate on OSI Layer 4, which is the transport
18%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
and will provide support for until April 2019 (Figure 1). If you want to install LXC in Ubuntu Trusty Tahr, you are best off using the v14.04.1 [4] server images. Kernel 3.13 (used here) has five years of LTS
18%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses root@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
18%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
GitHub page, as belonging to "Docker analysis & hacking tools." A YouTube video about the tool [4] jumps straight to the point by admitting that it dissects Docker images and abuses an image registry
18%
Upgrade Fever
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Apple products, although I had previously vowed to embrace them after purchasing an iPad and new iPhone 4. Note here that the iPhone 4 is now two generations behind the latest in Apple iPhone technology
18%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
for the utilities there were cached. This is done via the mincore(2) system call [4], which was first introduced in 4.4 BSD but is not present in all *nix systems. It provides information on the page fault status
18%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
display. But, the Iconia Tab A510 runs Android 4.0 Ice Cream Sandwich (ICS), which has been slightly customized by Acer to include a circular launcher. The front of the tablet features a 2Mpx camera
18%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
much variation is accepted across data center and cloud server platforms. Table 1 RHEL 6 Recommendations RAM Swap Space Up to 4GB 2GB 4GB to 16GB 4GB

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice