Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente 12 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
Keywords

« Previous 1 2 3 4 5 6

15%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
: mkcephfs -a -c /etc/ceph/ceph.conf -k /etc/ceph/admin.keyring Now you need to ensure that ceph.conf exists on all the hosts belonging to the cluster (Figure 3). If this is the case, you just need to start ... 9
15%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
.have_ssl() then 11 return false 12 end 13 return true 14 end The portrule in Listing 2 creates the variables svc.std and svc.ssl as associative arrays (lines 2 and 3) and then checks to see
15%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
and least connected, and they are also the most commonly used in LVS clusters. Configuration Piranha [3] is a clustering product from Red Hat based on the LVS concept. It includes the IPVS kernel code ... 3
15%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
/www/webmail. Following this, the installation proper can begin: /var/www/webmail/pear/pear -c /var/www/webmail/pear.conf install -a -B horde/webmail The script terminates with the following message: ... install ok
15%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f90ae275 08 Contact: Alice 09 ... The media data transferred in the course of a voice or video call are typically transported one
14%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
14%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
to do, but some basic tools can help you. For example, tools such as sysstat utilities sar, iostat, and nfsiostat [1]; iotop [2]; and collectl [3] can be used to help you measure your I/O usage. (This
14%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0 ... 3

« Previous 1 2 3 4 5 6

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice