Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (452)
  • Article (160)
  • News (58)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 68 Next »

26%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
: Enabled. Self-test execution status: ( 249) Self-test routine in progress... 90% of test remaining. Total time to complete Offline data collection
26%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
more quickly at 391 and 386KBps than Gluster at 12KBps and Lizard at 19KBps (Figure 2). However, the client's CPU load for the two Ceph candidates was well over 90 percent, whereas Bonnie only measured
26%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
on those attack surfaces that a professional attacker would tend to exploit. IBM refers to a Forrester survey, according to which users of the IBM Randori tool require 90 percent less time for vulnerability
26%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception
26%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
The Secure Boot feature, officially known as the UEFI 2.2 specification, requires the use of digital signatures to allow – or prevent – the loading of device drivers and operating systems. This precaution
26%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
8 7144 9564 54 1132 2XRedundancy 116 3 1016 4144 22 1188 appmgr It works the same way for services: PS> Get-Service -ComputerName XenApp1
26%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
 plugin for Amazon Simple Storage Service (Amazon S3) 20    - sftp plugin for SSH File Transfer Protocol 21    - ebs plugin for Elastic Block Storage 22    - local plugin for Local file system 23
26%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
if state[inst.id] 22 puts "#{inst.id} changed from #{state[inst.id]} to #{inst.state}" 23 else 24 puts "#{inst.id} was created and is now #{inst.state}" 25 end 26 state[inst.id] = inst
26%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
, 5900 for VNC and optionally 22 for SSH) and thus a minimal attack surface (Figure 4). You can use the web interface in Administration | Server to decide which services you want to provide
26%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 use_regex = 0 22 load_monitor = rup 23

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice