Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3!490 Llorente"22 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (78)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

42%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
addr = 10.42.0.101:6789 14 [mon.b] 15 host = bob 16 mon addr = 10.42.0.102:6789 17 [mon.c] 18 host = charlie 19 mon addr = 10.42.0.103:6789 20 [osd.0] 21 host = alice 22 [osd.1] 23 host
42%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
topology has two or more Satellite Servers that are connected to RHN through the Internet (see Figure 3). Each Satellite Server is synced with the others. This topology enables each subnet or project office
42%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
-address remotelan; 16 application any; 17 } 18 then { 19 permit; 20 } 21 } 22 } You need to define trustnet and remotelan in the zone address book because Juniper only processes
42%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
://www.zabbix.com   https://www.icinga.org http://www.nagios.org Version 1.8.x 1.8.6   1.6 3.3.1 License GPLv2 GPLv2   GPLv2 Core
42%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
. Because it had to run in RAM, extensions were difficult. This situation prompted the two to start working on their own distribution and spawned the development of pfSense [1]. The core of version 2.0 from
42%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0 ... 3
42%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
name: iscsi1 18 Node ID: 1 19 Multicast addresses: 239.192.181.106 20 Node addresses: 192.168.122.171 Note that the current cluster version 3.0 no longer contains a cluster configuration system ... 3
42%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
42%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
17 18 19 20 21 22 23 This example also
42%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
. This prevents the sender from filling up the cache too quickly. Port Scanners Nmap [3], which recently went to version 5.0, is the Swiss army knife of port scanners. Portbunny [4] is a relatively new tool

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice