Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (74)
  • Article (1)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8

84%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
"creating" $vmname 09 10 virsh suspend rhstorage 11 virt-clone -o rhstorage -n $vmname -f /var/lib/libvirt/images/$vmname.qcow 12 virsh resume rhstorage 13 14 oldmac="52:54:00:B4:DF:EB" 15 newmac
84%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
::ffff:0:0 IPv4 addresses (mapped) 5 5 2001::/32 Teredo The Precedence column assigns a value of 40 to an IPv6 global unicast address and a value of 50
84%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer"; 13 $node2 = "AppServer"; 14 $node3 = "DBMServer"; 15 $think = 0.0 * 1e-3; # as per test system 16 $dtime = 2.2 * 1e-3; # dummy service time 17 18
84%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
its own IP address, a concept that has potential for terminal devices (hosts, laptops) on IPv6. On the other hand, a service- or application-oriented technology like this is very close to shared hosting
83%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
that it locates: oops::000:100::/:/bin/sh This password file entry allows someone to log in as the root-equivalent user oops without a password: grep '.*:.*:00*:' /etc/passwd | awk -F: 'BEGIN {n=0}; $1
83%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
.crt files on the OpenVPN server. On the client side (a laptop in this case) you only need the CA.crt and tls-auth.key files. The client.pem file belongs on the e-token. The lower part of the figure shows

« Previous 1 2 3 4 5 6 7 8

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice