Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (175)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

20%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
. To automate this process on a Windows DHCP server, you can use the netsh command. To create a new reservation, just issue the following: netsh dhcp server scope 10.10.0.0 add reservedip 10.10.47.11 00E0C0E0B0B
20%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
. Vmtouch comes to the rescue with its most powerful option: -dl, for "daemonize and lock." Listing 1 Vmtouch Gzip Example 01 $ ./vmtouch /bin/gzip 02 Files: 1 03 Directories: 0 04
20%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
686 oprofile-0.9.5-4.fc12.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
20%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
are missing, potential causes include invisible SIP traffic, incorrect selection of the network interface, or missing permissions. Your first step is to check whether SIP traffic exists sudo tcpdump -i eth0
20%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
20%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit
20%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
20%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
run the tool with the -a option, it creates the matching device mapper files: $ kpartx -l ff-clone7.img loop0p1 : 0 20969472 /dev/loop0 2048 $ kpartx -a ff-clone7.img $ kpartx -l ff-clone7.img loop0p1
20%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Mike Flippo, 123RF
server PING server: 56 data bytes 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=0. time=0.415 ms 64 bytes from server.examplenet.com (192.168.5.6): icmp_seq=1. time=0.215 ms 64 bytes from
20%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice