Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (173)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

19%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
.reset_stats= 04 blkio.io_queued=Total 0 05 blkio.io_merged=Total 0 06 blkio.io_wait_time=Total 0 07 blkio.io_service_time=Total 0 08 blkio.io_serviced=Total 0 09 blkio.io_service_bytes=Total 0 10
19%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
server PING server: 56 data bytes 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=0. time=0.415 ms 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=1. time=0.215 ms 64 bytes from
19%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
a line like this: 1269925389.847294 write( 17, " 37989 2136595 2136589 213" ..., 3850) = 3850 <0.000004> This single line has several interesting parts. First, the amount of data written appears after
19%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
19%
BackTrack 5 R2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
of Maltego, version 4.2.0 of the Metasploit exploit framework (Community Edition), an update of the Browser Exploitation Framework (BeEF), and version 3.0 of the Social-Engineer Toolkit (SET). Other new tools
19%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
lockdown: iOS 5: handle 'Error' key in lockdown_check_result 03 d2db9b97b0487e3e0c65cca0e0dd02a747a61113 Fix memory leak in idevice_device_list_free 04 d51431edc3987cb9e595fdec874cdf869935d21d idevicebackup2
19%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
19%
Updating Small Business Server 2008
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Petra Wanzki, Fotolia
Connections action is enabled. To enable the rule on the clients, enter gpupdate /force or reboot. Forefront for Exchange 10.0 with SP2 Rollup 2 During the SBS 2008 installation, you can opt to install a 120
19%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
version 2.6.23. To check your system, you can enter the command: uname -r. You'll be on the safe side as of openSUSE 11.0 and Ubuntu 8.04. Additionally, your kernel needs to enable support for dynamic
19%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
with Linux Debian 5.0.7, Ubuntu 10.10, and openSUSE 11.3. If you don't use Linux, check out the "Other Operating Systems" box. Other Operating Systems If you do not use Linux, you'll need to find out

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice