Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"523%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (353)
  • Article (65)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 47 Next »

56%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
25Mbit allot 1514 cell 8 weight 2500Kbit prio 3 \maxburst 20 avpkt $PKT bounded 16 # Now add filters to your child class 17 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12 ... 2012
56%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
2012
56%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator ... 2012
56%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
/filter.d/sasl.conf: failregex = (?i): warning: [-._\w]+\[\]: SASL (?:LOGIN|PLAIN|(?:CRAM|DIGEST)-MD5) authentication failed: authentication failure A quick hunt through my /var/log/mail.log files reveals: Dec 20 22 ... 2012
56%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
,448 of 25,149 connection requests were successfully processed and analyzed with the use of honeypots. In the case of other connection attempts, the ports were either just tested, or the requested service ... 2012
56%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
2012
56%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
/burp/burp-server.conf. In the Unix variant make install also sets up a cron job for the client; it runs every 20 minutes by default. You define the data to be backed up in the respective client config file /etc ... 2012
56%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
Since the Linux kernel 2.6.20 release in February 2007, the Kernel-Based Virtual Machine, KVM [1], has made much progress in its mission to oust other virtualization solutions from the market. KVM ... 2012
56%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
or Active Directory-based authentication. Icinga can handle IPv6 – which legacy Nagios cannot. Icinga supports more than 20 languages and has many other benefits to offer. Nagios proudly points to its long ... 2012
56%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
Joos has worked in IT for more than 20 years on projects, as a consultant, and as an author of hands-on books for Windows and Microsoft professionals. Meet him online at http://thomasjoos.spaces.live.com. ... 2012

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 47 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice