Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1148)
  • Article (287)
  • News (73)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 152 Next »

16%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
). Listing 3 opreport for Mutt opreport -l /usr/bin/mutt CPU: Core 2, speed 2401 MHz (estimated) Counted L2_RQSTS events (number of L2 cache requests) with a unit mask of 0x7f (multiple flags
16%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
+ display, 8Mpx camera, and microSD card reader – all in a slim 8.3mm body. And, the 7-inch Asus Eee Pad MeMO ME370T – powered by the Tegra 3 quad-core mobile processor and running Android 4.0 Ice Cream
16%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
; in Listing 3, the bridge device is then configured with its IP address and other parameters. Listing 2 Network Configuration (1) [Match] Name=enp2s25 [Network] Bridge=docker0 Listing 3
16%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
] Name=docker0 [Network] DNS=192.168.100.1 Address=192.168.100.42/24 Gateway=192.168.100.1 Listing 3 Network Configuration (2) [Match] Name=enp2s25 [Network] Bridge=docker0
16%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
be used to fix any vulnerabilities found. Mapping the Network In this example, I use 10.0.0.0/16 as the internal network. If you do not know the exact IP addresses of your DCs, you can easily find them
16%
Google Compute Engine Open for Business
10.12.2013
Home »  News  » 
 
OS with a Google-modified kernel), as well as transparent maintenance and new 16-core instances. Standard pricing ranges from US$0.104 per hour ($.114 in Europe) for a 1-core system with 3.75GB RAM to US$1.659 ($1
16%
HP Expands Security Offerings
13.09.2012
Home »  News  » 
 
. ArcSight Express 3.0 – delivers market-leading correlation, log management, and user-activity monitoring to improve an organization’s ability to rapidly detect and prevent cyberthreats. It is the first
16%
PrivDog Security App Could Compromise User Security
03.03.2015
Home »  News  » 
 
the user visits some spoofed HTTPS web pages. The CERT team has confirmed that the problem affects version PrivDog 3.0.96.0. However, even if you’re using another version of the tool, this might be a good
16%
Ubuntu 15.10 “Wily Werewolf” Appears
28.10.2015
Home »  News  » 
 
, and the Ceph 0.94.3 “Hammer” distributed storage system. Ubuntu provides separate editions for various IT use cases, including Desktop and Server, as well as a Cloud edition and the Snappy Core version
16%
Fedora 32 Server (Install Only)
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
://getfedora.org/en/server/download/ [3] Release notes: https://docs.fedoraproject.org/en-US/fedora/f32/release-notes/ [4] CC-BY-SA-4.0: https://github.com/fedoradesign/backgrounds/blob/master/default/CC-BY-SA-4.0

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice