Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (132)
  • News (44)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 69 Next »

55%
Our Technological Enlightenment
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© lightwise, 123RF.com
the numbers, sizes, capacities, and prices of the 1990s with those of today. For example, in 1995, a 500MB hard disk was considered large; today, my iPhone 4 has a 16GB capacity, of which I have just over 6GB ... 2012
55%
Taming Change in the New Era of Computing
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
2012
55%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
Partitions # df -h File system Size Used Avail Use% Mounted on /dev/mapper/VolGroup-lv_root 50G 1,7G 46G 4% / tmpfs 3,9G 0 3,9G 0 ... 2012
55%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
you are using Linux as a router (a home gateway, or a fully fledged multihomed router running BGP), and you want to throttle each LAN machine's outbound capacity so those machines play nicely with your ... 2012
55%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
data. 3. The data server now opens a direct connection to the tape server and sends a stream of backup data via the connection. The logs on both sides and transferred file history are sent ... 2012
55%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator ... 2012
55%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
that applies to all jails (a brief set of rules about a particular service) that don't have the ignoreip setting explicitly configured is: bantime = 1 maxretry = 3 Here, it's referring to how many ... 2012
55%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
offered by the server and the analysis system (Figures 3 and 4). Figure 3: Visible ports of an ordinary Linux web server as revealed by nmap ... 2012
55%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.0 in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline ... 2012
55%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3 ... 2012

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 69 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice