Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (115)
  • Article (3)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

28%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
virtual webs.test.com { 15 active = 1 16 address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21
28%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
. If a hostname is used it 06 * must match the reverse dns of the server. 07 * / 08 host = "10.42.0.1"; 09 10 /* passwords: the passwords we send (OLD C:) and accept (OLD N:). 11
27%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
27%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
depends on the liblzo2-2, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
27%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
192.168.2.0/24; 21 service any; 22 } 23 IPsec-policy pfs2-aes256-sha1; 24 } 25 } 26 } 27 } Again you can reuse the proposal and the policy. Assuming
27%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
( ) Used for grouping and back references \n Back reference: Expands to whatever matched the n th ( ) pattern Suffixes How Many to Match ? 0 or 1 * 0
27%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
expressions # tcpdump -n -I eth1 host 10.10.253.34 and host 10.10.33.10# tcpdump -n -I eht1 src net 10.10.253.0/24 and dst net 10.10.33.0/24 or 192.5.5.241# tcpdump -n -I eth1 src net 10.10.30.0
27%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
= *from++; case 1: *to = *from++; }while(--n>0); } } Duff's device is obsolete today, in the simplest terms because it produces code that optimizing compilers will never be able
27%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that's 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
27%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
) ) ! mem for unew, u 087 088 ! 089 ! Boundary Conditions 090 ! =================== 091 ! 092 pi = DACOS(0.0d0) 093 094 ! Top of unit square: (N) 095 DO i=1,m 096 x=delta*(i-1) 097 u(i,m) = dsin

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice