Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last week
Sort order
  • Date
  • Score
Content type
  • Article (Print) (173)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 18 Next »

18%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
data. The differences are in the way they implement these requirements. On the one hand are network filesystems, in which the most popular representative in the Unix/Linux camp is Network Filesystem
18%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
– such as enabling the network or launching the httpd. Each of these tasks is a job from Upstart's point of view, but it will only take on a job if a matching event has occurred previously. An event of this kind could
18%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
of managed devices on your network. The next task isn't as easy. For it, you must tally the different mobile device types you deal with. Think of the possible options facing you: Windows Mobile's various
18%
A free anti-spam tool for Exchange environments
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© baurka, 123RF.com
with a large volume of email. The best option is to use a Linux server – for example, Ubuntu or Debian. That said, however, administrators on Windows networks do have the option of running ASSP on Windows
18%
BackTrack 5 R2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
Hydra Password cracking Kismet Packet sniffer Metasploit Pen testing Nmap Network scanning Ophcrack Password cracking RFMON
18%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
very surprised. After all, when you think of data theft, this is not typically what springs to mind. The culprits did not need to hack the network, because the people in charge had just ignored the issue
18%
Service Management Facility (SMF) in OpenSolaris
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Steve Cukrov, Fotolia.com
Management Resource Identifier (FMRI) identifies a service on the system. The service and instance name are passed to the FMRI as follows: svc:/Service:Instance In the following example, svc:/network
18%
Virtualization with Microsoft Hyper-V
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Roman Sigaev, 123RF
. This setup works both with cluster shared volumes and with SANs or iSCSI solutions. If you use a separate network for cluster communications, make sure that the client for Microsoft networks and file
18%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
To operate Synergy, you need at least two PCs, each with its own operating system, monitor, and functional network card. The software supports Windows 95 through Windows 7, Mac OS X as of version 10
18%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
-Pprinter | grep -q "printer is ready" To match the output from lpq, you need to modify the search string for grep. The ping command checks network connections. The exit error codes differ, depending

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice