Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%2222%A9n Llorente"523 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (77)
  • Article (4)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

46%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
46%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
master.cf 01 mlmmj unix - n n - - pipe 02 flags=DORhu user=mlmmj argv=/usr/bin/mlmmj-receive -F -L /var/spool/mlmmj/$nexthop/ Finally, you need to tell
46%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
in the world of LVM [1] [2]. Physical volumes (PVs) are block devices (i.e., whole disk or partitions). To allow an LVM to use a PV, the LVM must be initialized using a command that I will show shortly. Doing
46%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
../smbtatools-1.2.2 Next, make and make install the compiler package and copy the programs to the correct location. To start the daemon, type smtad -u -n which tells the daemon (u) and the client (n
46%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
-N sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure 2): sudo iptables -A INPUT -j
46%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
# start. 32 if [ -n "$OCF_RESKEY_monitor_sipuri" ]; then 33 ocf_run sipsak -s "$OCF_RESKEY_monitor_sipuri" 34 rc=$? 35 case "$rc" in 36 1|2) return $OCF
46%
ratarmount Archive Mount Tool
07.09.2025
Home »  Articles  » 
I previously wrote about the use of archivemount, which creates compressed archives with common tools such as tar  and gzip,  so everything for a user project is contained in a single file. I
46%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
VPN. The free SSL virtual private network (VPN) joined the mainstream with release 2.1, and it is useful for large-scale setups. Aladdin [2] dominates the market for USB stick-based cryptographic access control
45%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
be used with a curl  command and the requested URL for the n1  node information. Part of the output of the command can be seen in the dark window at the bottom. This live session lets you try different
45%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
, and IZES Institut für ZukunftsEnergieSysteme (Institute for Future Energy Systems) GmbH [1] [2] investigated precisely this topic. The question the researchers set out to answer was: How economical

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice