Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (151)
  • Article (2)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

24%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
Resident Pages: 0/15 0/60K 0% 05 Elapsed: 8.1e-05 seconds 06 $ ./vmtouch -vt /bin/gzip 07 /bin/gzip 08 [OOOOOOOOOOOOOOO] 15/15 09 10 Files: 1 11 Directories: 0 12 Touched Pages: 15 (60K) 13
24%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache. I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup
24%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
24%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
\ 02 --hostname=foo.bar.de --mac- address=00:40:26:CA:10:DD \ 03 --kopts="stage=test app=www" --ksmeta="stage=test app=www" 04 # cobbler system edit --name=foo --interface=eth0 --mac=00:40:26:CA
24%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
565b5901d666de3bfe538be27aebb9f443de98f0 notification_proxy: use free() instead of g_free() 10 5c10f12e408b11afbd7c3cc93ddf7d85f1527417 ideviceinfo: fix possible segmentation fault when parsing empty
24%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
` ]]; then 078 mkdir ./`dirname $l` > /dev/null 079 fi 080 cp $l .$l 081 done 082 done 083 084 cd /export/home/jail/$JAILUSER/devices/pseudo 085 mknod mm@0:zero c 13 12 086 mknod mm@0:null c 13 2
24%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
CPU PROCESS/NLWP # 173 daemon 17M 11M sleep 59 0 3:18:42 0.2% rcapd/1 # 17676 apl 6916K 3468K cpu4 59 0 0:00:00 0.1% prstat/1 # ... # ZONEID NPROC SWAP RSS MEMORY TIME
24%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
-type traffic, as well as for the local link address (i.e., good old 127.0.0.1). Getting IPv6 Connectivity You can get IPv6 connectivity in several ways: native IPv6 access, IPv6 tunnels, Teredo (Miredo on Unix
24%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
available as version 0.0.2 [8] (see the "Stresstest" box). Figure 1: Stresstest stresses SMBTAD by continually generating Samba traffic
24%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
with Linux Debian 5.0.7, Ubuntu 10.10, and openSUSE 11.3. If you don't use Linux, check out the "Other Operating Systems" box. Other Operating Systems If you do not use Linux, you'll need to find out

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice