Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (968)
  • Article (281)
  • News (125)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 138 Next »

22%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
to OpenStack integration is evidenced by the detailed documentation on the topic of “RHSS and OpenStack” in the RHSS guide (Figure 6). Figure 6: If you
22%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
22%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses will be relevant. In the input field, you can enter both IPv4 and IPv6
22%
Virtual switching with Open vSwitch
28.07.2011
Home »  CloudAge  »  Articles  » 
 
time. To do so, load the kernel module manually: modprobe datapath/linux 2.6/U openvswitch_mod.ko If this command fails, you probably need to unload a bridge module: rmmod bridge. The kernel module
22%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
registered. Figure 6 shows how easy it is to access a KVM hypervisor virtual machine via VNC. Figure 6: MobaXterm also enables quick graphical access to a VNC
22%
Tuning ZFS for Speed on Linux
17.03.2020
Home »  HPC  »  Articles  » 
device partition as the SLOG to the pool, enter: $ sudo zpool add myvol log nvme0n1p2 Then, verify that the cache volume has been added to the pool configuration (Listing 6). Listing 6: Verify Pool
22%
Blending Java with other programming languages
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
has a treasure trove of packages in its repository. However, if you need to integrate legacy Java applications, Jython is definitely an interesting option. Rhinos to the Rescue Java 1.6 saw
22%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
, such as the free antivirus ClamAV [5] or the free anti-malware tool Linux Malware Detect (a.k.a., maldet) [6], would be another interesting use case for Watchman. The maldet tool uses the Linux inotify facility
22%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
not vary with distribution, and Colin himself has published [6] data indicating an average of 1.5 and 6.9 seconds, respectively; however, these numbers may vary with AWS region, availability zone
22%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
applications available by selecting Reporting : Nagios Core [5], NagVis [6], and Check_MK [7]. Each provides a different view of the Nagios3 monitoring data. Nagios Core is an event scheduler, event processor

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice