Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (547)
  • Article (159)
  • News (35)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 75 Next »

16%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
eBox Technologies, and it is available as a free Basic Subscription as well as a Business and Enterprise Edition [3]. Essentially, the differences lie in the number of users and the update services
16%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
understanding of parallel computing [1]. I used the Ubuntu 9.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting
16%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
-N sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure 2): sudo iptables -A INPUT -j ... 3
16%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
], Fabric [3], or Capistrano [4], MCollective relies on middleware based on the publish/subscribe method to launch jobs on various nodes. The middleware supported by the framework can be any kind of STOMP
16%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
. 25 26 Next Steps: Boot the zone, then log into the zone console 27 (zlogin -C) to complete the configuration process 01 # zoneadm -z web1 boot Listing 3 Interactive
16%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
magazine [6]. Infos PAL: http://pal.codeplex.com Log Parser 2.2: http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&DisplayLang=en Office 2003 Add
16%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
on your system. Almost all firewalls allow port 22 access, so you don’t have to configure anything extra, such as NFS or CIFS. You just need one open port on the firewall – port 22. All the other ports can
16%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
instructions, hunting down tools, and undoing missteps before you can enjoy your new furniture. Indeed, should you not have the mechanical inclination to put bolt A16 into offset hole 22, your new furniture
16%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
with OS fingerprinting. The following command executes a simple port scan on a chosen system: nmap -v -A www.haribo.de An abridged version of the output from this command is shown in Listing 1. Listing 1
16%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, they convert arbitrary input to fixed length output. The output is typically a hex number: for example, the MD5 hash of the word “Hello” is 8b1a9953c4611296a827abf8c47804d7. To be secure, a cryptographic hash ... SHA-3 – The New Hash Standard

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice