Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub%26213%2525A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (448)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 Next »

29%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0
29%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
vote is needed to calculate the quorum. When clusters have more than two nodes, at least half the votes from the existing cluster nodes plus one are needed (n /2+1). A two-node cluster is thus
29%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
capture or display filters. The capture filter would look like this: port 22 Then start capturing, initiate an SSH login at the console, and in the Analyze menu, select Follow TCP Stream . The result
29%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
17 18 19 20 21 22 23 This example also
29%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
network printer on an internal network. The scan relies on the fact that the IPID (a numeric field in the IP packet header) rises linearly on older systems and is thus predictable
29%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
As of kernel 2.4.x As of kernel 2.2.x Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu BSD – FreeBSD, NetBSD, OpenBSD No No Free
29%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
workload is pretty time-consuming. The current version of Fio is 1.57. I have created a package for Debian that the Ubuntu developers integrated into Ubuntu. If you have SUSE versions since SLES 9 and open
29%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
29%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
-b81d-c42b-c008-a70649501262 05 # stmfadm add-view -h myiscsiclient -t myiscsiserver -n 1 600144f05f71070000004bc999020002 # cat /etc/iscsi/initiatorname.iscsi InitiatorName=iqn.1993-08.org
29%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice