Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (90)
Keywords

« Previous 1 2 3 4 5 6 7 8 9

18%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
Include { 13 File = /usr/sbin 14 Options { 15 Signature = MD5 16 } 17 } 18 Exclude { 19 File = /var/lib/bacula 20 File = /tmp 21 } 22 } 23 24 Messages { 25 Name = Daemon 26
18%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
-resource browser simulator used for test scenarios involving HTTP. You will also find the Mechanize library [6], which contributes functions for automated interactions on websites. Additionally, thanks to the Ruby
18%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
to connect to the remote host with ssh. (6) expect – Wait for "(yes/no)? " in the output. This is the end of the several-line output about host key exchange. (7) send – Send the string "yes" plus
18%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
of options, including dual four-core Xeon, dual six-core Xeon, or quad 12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per
18%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
to popular ports, such as 80 (HTTP) or 22 (SSH), and pings. If Portbunny does not register a response to a port request, but the trigger packet reaches the target, it tags the port as filtered. Using Portbunny
18%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
is not accessible! ****************" >> dba.log 15 /usr/local/etc/rc.d/002pgsql.sh start 16 sleep 15 17 psql -U monitor -d monitor -c "select * from watch;" 18 19 if [ $? -eq 0 ]; 20 21 then 22
18%
Dispatches from the world of IT
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
of the applications (22 percent) of the firms surveyed are currently hosted in the cloud. Additionally, 28 percent of testing now occurs in a cloud environment, and the report forecasts this to increase to 39 percent
17%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
17%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
on */ 17 port = 5556; 18 19 /* hub mask: the mask of servers that this server may hub. Multiple 20 * entries are permitted 21 */ 22 hub_mask = "*"; 23 24
17%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
16 into offset hole 22, your new furniture might never live up to your expectations. Additionally, integrating the furniture into an existing room could be a challenge. Forgetting that the new surround

« Previous 1 2 3 4 5 6 7 8 9

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice