Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: expect ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (100)
  • News (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 43 Next »

29%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
. With the exception of the user namespace, the host and container use independent namespaces. For example, the systemd process for the PID namespace uses PID 1 on the host, whereas inside the container the Bash shell
29%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
WMI is unusual and suggests that this is only designed to work around antivirus programs that do not monitor such WMI activities. The decrypted downloader works almost identically, except that it loads
29%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
with information about the protocol type of the carrier data packet (e.g., IPv4 or ARP). Payload data: The rest of the frame contains the payload data, except for the last 4 bytes, which has the: Frame check
29%
New features in Windows Terminal Preview
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Mohamed Shaffaf on Unsplash
you any good because they will just be created again. However, you can disable them by enabling the Hide profile from dropdown option. The settings in Defaults apply to all profiles. Exceptions
29%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
that uptime provides (load averages for 1, 5, and 15 minutes). The resulting Python script is fairly simple (Listing 1). Listing 1: Uptime-like Information #!/usr/bin/python try: import os except Import
29%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception
29%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
is quite close except in a couple of instances. For example in the sequential write tests, SSHFSM is sometimes up to 5% faster than SSHFS. SSHFSM in the OPT4 results for the sequential re-write test
29%
TinyDNS
02.03.2012
Home »  Articles  » 
 
influencer Dan Bernstein  and, as well as writing the phenomenal mail server QMail (second only to sendmail in popularity) among other exceptional contributions, he wrote a DNS server called djbdns
29%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
scalable and maintainable. CloudForms CloudForms is Red Hat’s open, hybrid cloud and systems management platform and thus the core of all cloud solutions presented so far, with the exception of Open
29%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
.txt Public Videos The basic ls command displays very little information about the directory’s contents except for file names. On most Linux systems, the ls command shows you a color-coded file listing

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice