Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 000 Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (79)
  • Article (3)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

18%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
with ; or \g. 03 Your MySQL connection id is 3 to server version 5.0.22 01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
18%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
; whereas KVM [3] supports genuine hardware virtualization in combination with the right CPU. Both virtualization technologies support maximum performance for the guest system in line with the current state
18%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [3], which means shutting down the system
18%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
::1 (all nodes; Figure 3). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
18%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
has some capabilities [3] that sar does not have. A collection of supporting tools [4] can also help collectl gather and post-process data. Collectl is easy to install if Perl is already installed
18%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.0.2 [3] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
18%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
container images, and podman pull nginx:alpine downloads the nginx:alpine image from one of the registered container repositories. A Podman Compose [3] solution also processes docker-compose.yml files
18%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
18%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
)*   Julia Python MATLAB Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31
18%
Active Directory overview
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Maksym Yemelyanov, 123RF.com
, which in turn are transitively linked [3]. Active Directory uses the DNS system's defined namespace for domain naming. Within the domain, organizational units (OUs) exist – container objects for grouping

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice