Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 201 Next »

17%
Container and hardware e-virtualization under one roof
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Maxim Kazmin, 123R
virtual I/O drivers (PCI passthrough) for most guest systems and benefits from the VT extensions of today's CPUs. The KVM driver CD [4] offers a large selection of virtual I/O drivers for Windows. Most
17%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
To complete the basic configuration, add the lines from Listing 4 to the ACL section of squid.conf . At this point, you could add rules for more granular access on the basis of group membership. Listing 4
17%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
creates a 4KB string of each of the letters a , b , and c ; then, it puts the last character of the string into the first position over and over until the string reaches its initial state. The script
17%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
shown in Figure 4. Figure 4: Header bytes 12-15. Looking at byte 13, if SYN and ACK are set, then your binary value would be 00010010 , which
17%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
is based on SharePoint Online, lets users store documents at a central location and edit new documents or tables in the web-based version of the office applications (Figure 4
17%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
Now show the available plugins with the nessus_policy_list command (see Figure 4). Figure 4: Viewing the available policies in the Nessus policy list
17%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
is scrolling back in time (Figure 4). Figure 4: Going back in time with Zenith. You can tell the chart has gone back in time because at the very top it says
17%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
as SOHO users, and the software supports explicitly heterogeneous environments. Thanks to Samba 4, the distribution can act as a domain controller within a Windows-based network. The system also comes
17%
ONIE and Cumulus Linux on a switch
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Brian Kenney, 123RF.com
kernel of the ONIE installer. ONIE searches for the operating system and installs it. The ONIE installer [4] looks for the operating system in several locations. If ONIE finds a USB storage device
17%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
of terminal user interface (TUI) libraries, including Ncurses [3] and Newt [4]. Jeff Layton has previously graced these pages with a tutorial on how TUI tools are developed today [5], and yours truly followed

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice