Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 2821M8M8 09 09%88711bmw.com 09 09%892821M8M8 09 09%88711bmw.com 09 09%8020 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (103)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

56%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
for tscherf@TUXGEEK.DE: 03 04 # klist -5 05 Ticket cache: FILE:/tmp/krb5cc_500 06 Default principal: tscherf@TUXGEEK.DE 07 08 Valid starting Expires Service principal 09 08/06/10 15:41:50 08
56%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3 ... 8
54%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
/appengine/docs/go Go version 1 is released: http://blog.golang.org/2012/03/go-version-1-is-released.html Robert Pike on GoogleTechTalks: http://www.youtube.com/watch?v=rKnDgT73v8s Gorun: http://wiki.ubuntu.com
54%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
in this scenario and one of them is still working, Pacemaker can set the flag for the failed node, as long as the fencing function is enabled in DRBD. To do this in DRBD 8.4, you need to set the fencing resource
54%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
Switch(config)# dot1x system-auth-control 06 Switch(config)# radius-server host 10.1.1.1 key V@rYseCre!t 07 Switch(config)# interface fastethernet0/1 08 Switch(config-if)# switchport mode access 09 Switch
54%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
the PasswordHash class that this provides: $hasher = new PasswordHash(8, FALSE); The first parameter of the constructor defines how often Phpass should call the hash function. The value is a power of two
54%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
.Xensource.xenapi.Connection; 07 import com.Xensource.xenapi.Host; 08 import com.Xensource.xenapi.Session; 09 import com.Xensource.xenapi.Task; 10 11 import de.pm.xenserver.utils.Server; 12 13 public class TestAPI { 14 15
54%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
sprzblog mysql limesurvey -uroot -ppassword > backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non-replicated servers
54%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
09, pg. 90 PowerShell: http://technet.microsoft.com/en-us/scriptcenter/dd742419.aspx
54%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
:alice@somesipprovider.de>;tag=42 07 Call-ID: a84b4c76e66710de5f90ae275 08 Contact: Alice 09 ... The media data transferred in the course of a voice or video call are typically transported one

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice