Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

8%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
the runlevel event: start on runlevel [23] In this case, the job would only run in runlevels 2 and 3 – parallel to all the scripts in these runlevels. Upstart triggers the runlevel event when it processes
8%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
three lines. The first two lines give the feature name and a short intuitive description of the status to expect. The description can take up multiple lines. In Listing 2, the feature stipulates that www.xing.com
8%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
/0K /s] [4137 /0 iops] [eta 00m:06s] In the example, the first job is performing a sequential read, marked as r in square brackets, while Fio hasn't initialized the second job, marked as P
8%
What's new in Small Business Server 2011
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
A&M Rovenko, 123RF
than the SharePoint Services – but, more on this topic later. The new SBS again comes with state-of-the-art patch management based on Windows Server Update Services 3.0 SP2. Compared with predecessors
8%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
22 23 24 25 26 27
8%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
Individual sources report that more than 286 million new, positively identified malware instances were registered in 2010 alone [1], not counting unreported cases (i.e., malware that cannot
8%
Remote VMware console without a browser
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Julia Burlachenko, 123RF.com
). Listing 1 Browser Plugins for VMware Server 2.0 $ pwd /usr/lib/vmware/webAccess/tomcat/apache-tomcat-6.0.16/webapps/ui/plugin $ ls build_doNotErase.txt vmware-vmrc-linux-x64.xpi vmware
7%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
$ john -wordlist:password.lst passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 admin (root) 04 t-bone (khess) 05 guesses: 2 time: 0:00:00:00 100% c/s
7%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
an RFC 3484 – Default Address Selection for Internet Protocol version 6 (IPv6) – compliant [2] resolver library. Because IPv4 is used as a matter of course, whereas IPv6 is often used unintentionally
7%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
=yes In this case, NetShell might even return a response, such as 2 rule(s) were updated. OK indicating that the same rule has been deployed for two different profiles. Many standard rules are organized in groups

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice