Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 0mbén Llorente"5432 ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (216)
  • News (4)
  • Article (3)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 23 Next »

32%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.0-openjdk 02 # echo $JAVA
32%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
Suite (RHCS) and use CMAN as their Cluster Manager. Depending on the version you use, the implementation will look total different. The initial variant (version 1.0) included with RHEL 4 or very old
32%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home »  News  » 
 
to the images are now part of the virtual machine build scripts, and those scripts have also been upgraded to the Packer 2.0 standards. As far as the new hacking tools are concerned, you get Caido and Caido CLI
32%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
smartphone users, which was 2.9 per 1,000 smartphone users in 2011, is expected to climb to 4.0 in 2013." The Azaleos Managed MDM service provides device security management for lost, non-compliant, offline
32%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
exit codes when it terminates, you can use Unix conventions. 0 stands for error-free processing, whereas 1 indicates some problems were encountered. This value is stored in the $? shell variable, which
32%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
name. In OCFS2's case, a single ASCII file is all it takes (Listing 1). Listing 1 /etc/ocfs2/cluster.conf node: ip_port = 7777 ip_address = 192.168.0.1 number = 0
32%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
approach to setting up the PKI; you will find the scripts in /usr/share/doc/openvpn/examples/easy-rsa/2.0. You can start by modifying a couple of things in the vars; this is mainly to make the procedure more
32%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
main(int argc, char *argv[]) 06 { 07 char *newblock = NULL; 08 09 for (int allocation = 0; newblock = (void *) malloc(1024 * 1024); allocation++) 10 { 11 //for (int i=0; i < (1024 * 1024
32%
Keeping PowerShell in the loop
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Michael Mihin, 123RF.com
patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have to work around those
32%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
virtualization of domain controllers. And, making snapshots of domain controllers is no longer a problem either (see the article on Hyper-V 3.0 in this issue). VMware and other virtualization vendors likely

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice