Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (344)
  • Article (63)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 46 Next »

98%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
the Authorize Selected Device(s) button. To remove any authorized devices in the list, select the device and click the Revoke Device Authorization button. That device will no longer have access to your ... 2012
98%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
2012
98%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
2012
98%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
2012
98%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
2012
98%
Fedora 16 dials up cloud and virtualization capabilities.
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
. But at the top of the administrator's list has to be kernel 3.1, with its new KVM and Xen functionality, and Fedora 16's above average collection of virtualization and cloud computing tools. New Kernel 3.1 Much ... 2012
98%
Remotely controllingvirtual machines with virsh
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sellingpix, 123RF.com
2012
98%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
_NOT_RUNNING 08 fi 09 10 pid=`cat $ASTRUNDIR/asterisk.pid` 11 ocf_run kill -s 0 $pid 12 rc=$? 13 14 if [ $rc -eq 0 ]; then 15 if ocf_is_true "$OCF_RESKEY_realtime"; then 16 ... 2012
98%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
-Process cmdlet reports system process information in the format shown in Listing 1. Listing 1 Default Get-Process Format 01 Handles NPM(K) PM(K) WS(K) VM(M) CPU(s) Id ProcessName 02 ... 2012
98%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
is to enable your users, not constrain them. In the "old" days of the 1990s, we thought we had to lock down our users and jail them to protect them from themselves. Falsely, we were protecting our jobs. We didn ... 2012

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice