Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (344)
  • Article (63)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 46 Next »

98%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
understand how shaping or throttling works with tc: When shaping a 10mbit/s connection to 1mbit/s, the link will be idle 90% of the time. If it isn't, it needs to be throttled so that it IS idle 90 ... 2012
98%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
2012
98%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
programs. This is not always the security solution's fault. An application that is not programmed carefully and fails to comply with RFCs can trip a SIEM signature. In this test, Prelude suspected a DoS ... 2012
98%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
ban/filter.d/sshd.conf file. Don't worry: this first example isn't too trying. The two salient lines in the config file are as follows: failregex = ^%(__prefix_line)sFailed (?:password ... 2012
98%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
2012
98%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
environments and Infrastructure-as-a-Service (IaaS) clouds, such as Citrix CloudStack, OpenStack, and VMware vSphere, to high-value Platform-as-a-Service (PaaS) clouds. The announcement states that Cumu ... 2012
98%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
Estimate For example, burp -s l shows you the existing backup on the server ("list"), whereas burp -a l -b 2 lists all the files in backup number 2. If you want to see all the files in all ... 2012
98%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
. The agent will even run on older Windows 2000 server installations, and it builds the foundations for integrating Microsoft guests into your monitoring setup. The tool, which is based on NSClient++ [10 ... 2012
98%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
, Solaris, Mac Included in virtually any Linux distribution First public release 29 March 2000 7 April 2001   27 September 2009 1999 (as NetSaint) Price ... 2012
98%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
2012

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice