Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (90)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

13%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
uses the syntax tcpdump -n -I -s where -n means tcpdump should not resolve IP addresses to domain names or port numbers to service names, -I is the interface to use
13%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
$spin 08 @$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
13%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon S3 and Cloud
13%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
=~ s/%([0-9a-fA-F][0-9a-fA-F])/pack("U",hex($1))/eg; 11 # test for each group squid sent in its request 12 foreach $group (@groups) { 13 $group =~ s/%([0-9a-fA-F][0-9a-fA-F])/pack("U",hex($1))/eg
13%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
13%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
.0 of the compiler and the specification were released, promising compatibility with future Go releases [3]. Go is thus suitable right now for genuine software projects, not just experiments. The declared goals
12%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
for Enterprise JavaBeans (EJB) [2] and a web server based on Tomcat that supports servlets and JavaServer Pages (JSP). History and Architecture JBoss was developed in the 1990s by Marc Fleury as a pure EJB
12%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
}, 11 "run_list": [ "recipe[bootstrap::client]" ] 12 } Now you can launch Chef Solo: sudo chef-solo -c ~/solo.rb -j ~/chef.json -r http://s3.amazonaws
12%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
, name servers, and network hosts accessible through the Internet. The popular whois service also offers a means for discovering domain information. The Nmap scanner's -sL option (nmap -sL) performs
12%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud), S3 (Simple Storage Service), and SimpleDB, the book and coffee

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice