Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%25390 Llorente"22 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (126)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

46%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
Hark back to those halcyon days when the GIF89a and the blink tag ruled the web page and the most common use of htaccess on the nascent Apache HTTP Server was password protecting a directory. As you
45%
Configuring XP Mode in Windows 7
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF.com
license and the installation medium to do so. The path to the VHD container files is also available in the guest context if you configure file and folder sharing when you set up XP Mode (Figure 3). The C ... 3
45%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
, is well worth the investment. ITIL addresses more than just services, though, so when talking about the concepts, people typically refer to IT Service Management (ITSM). The current version (ITIL v3
45%
New approaches for forensics in cloud environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
illustrator, 123RF.com
. Haeberlen, "A Case for the Accountable Cloud," Proceedings of the 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware , 2009. B. Hay and K. Nance, "Forensics Examination
43%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
14 15 v=0 16 o=alice 53655765 2353687637 IN IP4 20.22.24.27 17 s=- 18 t=0 0 19 c=IN IP4 20.22.24.27 20 m=audio 20333 RTP/AVP 0 1 3 99 21 a=rtpmap:0 PCMvU/8000 The RTP port causes the next issue
43%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
43%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
conservatively originally 21 if {$force_conservative} { 22 set send_slow {1 .1} 23 proc send {ignore arg} { 24 sleep .1 25 exp_send -s -- $arg 26 } 27 } 28
43%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
that applies to all jails (a brief set of rules about a particular service) that don't have the ignoreip setting explicitly configured is: bantime = 1 maxretry = 3 Here, it's referring to how many
43%
Server virtualization with VirtualBox
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Federico Caputo, 123RF.com
apache2-mpm-prefork apache2-utils apache2.2-bin apache2.2-commona pache2-doc apache2-suexec libapache2-mod-php5 libapr1 libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap libapr1 libaprutil1 libaprutil1
43%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure 3). Figure 3: Scheduling the replication

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice