Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (81)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

13%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
combinations are supported: ShadowProtect 4.0.1: Oracle VirtualBox 3.1.0--3.2.6 ShadowProtect 4.0.5: Oracle VirtualBox 3.1.0--3.2.12 ShadowProtect 4.1: Oracle VirtualBox 3.1.0--4.0.4 Shadow
13%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
/openvpn/keys/CA.crt 08 cert /etc/openvpn/keys/server.crt 09 key /etc/openvpn/keys/server.key 10 tls-auth /etc/openvpn/keys/tls-auth.key 11 12 server 192.168.1.0 255.255.255.0 13 14 keepalive 10 60 15 comp-lzo 16 17
13%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
uses the syntax tcpdump -n -I -s where -n means tcpdump should not resolve IP addresses to domain names or port numbers to service names, -I is the interface to use
13%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
the root string (the so-called root logger) that is contained in the default messages by setting the following format: logging.basicConfig(format='%(levelname)s:%(message)s') But, more on that later
13%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
virtual webs.test.com { 15 active = 1 16 address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21
13%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
computers running the Linux distributions CentOS 5 and 6, Debian 5 and 6, Fedora, Gentoo, Mageia, openSUSE, RHEL 5 and 6, Scientific Linux, and Ubuntu 10.04, 11.04, and 12.04. Additionally, it can handle
12%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
------- ------ ----- ----- ----- ------ -- ----------- 03 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 04 74 9 1464 2568 42 0.09 2172 armsvc 05 195 10 2380 2984 62 0
12%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990s by Sun Microsystems, PAM is available on most Unix-style systems
12%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
, Russ Cox joined the Go project, and the work went forward a little faster. In November 2009, the team finally presented the first public release of the Go compiler. In March 2012, version 1.0
12%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
Cloud computing is, without a doubt, the IT topic of our time. No issue pushes infrastructure managers with large-scale enterprises as hard as how to best implement the cloud. The IaaS principle

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice