Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12%A9n Llorente"22 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (98)
  • Article (1)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10

55%
Passwords, passphrases, and passkeys
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © berkay08, 123RF.com
The classic password has a long history and the terms, along with the times, are a-changing. At the end of the day, everyone still uses passwords, but the term passphrase, for example, describes
54%
Creating KVM machines with BoxGrinder and VMBuilder
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© yewkeo, 123RF.com
- sl plugin for Scientific Linux 09 10 Available platform plugins: 11 - vmware plugin for VMware 12 - ec2 plugin for Amazon Elastic Compute Cloud (Amazon EC2) 13 - virtualbox plugin ... 12
54%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
-ons. This explains why there have been more than 3 million new Nagios installations worldwide in the past 12 months. This is why Nagios is the industrial standard for monitoring today. … Nagios has a much larger
54%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
/usr/lib64/ruby/1.8/logger.rb:487:in `initialize' 12 /usr/lib64/ruby/1.8/logger.rb:263:in `new' 13 /usr/lib64/ruby/1.8/logger.rb:263:in `initialize' 14 /usr/lib/nagios
54%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
" votes="1" nodeid="1"> 07 08 09 10 11 12 13 14
54%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
capture or display filters. The capture filter would look like this: port 22 Then start capturing, initiate an SSH login at the console, and in the Analyze menu, select Follow TCP Stream . The result
54%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
10 11 12 13 14 15 16
54%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
network printer on an internal network. The scan relies on the fact that the IPID (a numeric field in the IP packet header) rises linearly on older systems and is thus predictable
54%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
, but you will be spending time deciphering instructions, hunting down tools, and undoing missteps before you can enjoy your new furniture. Indeed, should you not have the mechanical inclination to put bolt A ... 9

« Previous 1 ... 3 4 5 6 7 8 9 10

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice