Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (101)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

13%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
environments. The example in Listing 3 shows how you could handle scripting if this is relevant to your environment. Listing 3 Handling Special Cases 01 OS=`uname -s` 02 RSH="rsh -l user" 03 RSH2
13%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
11 12 v=0 13 o=alice 53655765 2353687637 IN IP4192.168.1.10 14 s=- 15 t=0 0 16 c=IN IP4 192.168.1.10 17 m=audio 5678 RTP/AVP 0 1 3 99 18 a=rtpmap:0 PCMU/8000 The most widespread NAPT technology
13%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [3] that automatically expire. You can
13%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
uses the syntax tcpdump -n -I -s where -n means tcpdump should not resolve IP addresses to domain names or port numbers to service names, -I is the interface to use
13%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
$spin 08 @$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
13%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon S3 and Cloud
13%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
=~ s/%([0-9a-fA-F][0-9a-fA-F])/pack("U",hex($1))/eg; 11 # test for each group squid sent in its request 12 foreach $group (@groups) { 13 $group =~ s/%([0-9a-fA-F][0-9a-fA-F])/pack("U",hex($1))/eg
13%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
13%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
.0 of the compiler and the specification were released, promising compatibility with future Go releases [3]. Go is thus suitable right now for genuine software projects, not just experiments. The declared goals
12%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
. Alternatively, you can search for vscode in the App Center and click the Install button. If you prefer the terminal, you can find detailed instructions for any Linux distribution online [3]. I also suggest

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice