Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (80)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

29%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
of Ubuntu, 10.04 (Lucid Lynx), which comes with Postfix 2.7 and Dovecot 1.2. In the following example, both components should be installed and functional, and the individual user accounts should come from
29%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
the process will make you feel more comfortable about pushing changes live across your cloud. I talked to cloudy people about how to get code onto new instances, and I tried lots of different things
29%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
"; 06 07 while(<>) { 08 if ( /^From:/ ) { 09 `sudo /etc/init.d/gdm restart` if ( /$legit_sender/ ); 10 exit 0; 11 } 12 } Two final authorization changes are needed to make
29%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
: Logging in 06 Given I am on http://www.xing.com/ 07 When I fill in "username-field" with "username" 08 And I fill in "password-field" with "password" 09 And I press "login-button" 10 Then I
29%
Request Tracker – the underestimated open source ticket system
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
Richard CAtA, 123RF.com
: {$Ticket->OwnerObj->Name} 09 Requestor: {$Ticket->Requestors->EmailsAsString()} 10 Ticket URL: {$RT::WebURL}Ticket/Display.html?id={$Ticket->id} 11 12 Please check the content. If everything turns out
29%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
: 1331404720 TZ: -0500 09 # SubSys: bcdfijmnstYZCD Options: cz Interval: 10:60 NumCPUs: 4 NumBud: 3 Flags: ix 10 # Filters: NfsFilt: EnvFilt: 11 # HZ: 100 Arch: x86_64-linux-thread-multi PageSize: 4096 12 # Cpu
29%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 05 op stop interval="0" timeout="60" 06 op monitor start-delay="0" interval="1200" 07 meta resource-stickiness="0" failure-timeout="180" 08 09 primitive stonith_bob stonith
29%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
$password = "test12345"; 09 // In a production web application, the password would be retrieved from a form filled out by the user 10 $hashwert = $hasher->HashPassword($password); 11 12 echo "Password
28%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
,"n2") 09 #2 = #1 10 return addprocs_ssh(#2) 11 end 12 ))),1),(),(),intset(1))}) 13 julia> nprocs() 14 4 To verify that the remote nodes are indeed involved with the computation, I can devise
28%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
figuring out other ways of spotting patterns – one such tag being . If you're sitting comfortably, the pattern below matches an SSH login attempt failure which, on a Debian box, lives in the /etc/fail2

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice