Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1266)
  • Article (320)
  • News (209)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 180 Next »

9%
Law of Averages – Load Averaging
01.02.2013
Home »  Articles  » 
 
at the output of uptime [1] on OS X:   13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63   The uptime command displays the load average in its common form, averaging the last one, five, and 15
9%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
see the newly uploaded keypair: ec2-describe-keypairs KEYPAIR dan-key fc:39:b2:60:90:4c:0f:66:fc:b8:a6:54:af:19:0c:ef KEYPAIR my-key a6:54:af:19:0c:ef:fc:39:0f:66:fc:b8:b2:60:90:4c KEYPAIR your
9%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
at the output of uptime [1] on OS X: 13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63 The uptime command displays the load average in its common form, averaging the last one, five, and 15 minutes
9%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
. CMMC in Depth CMMC is currently on its second iteration, CMMC 2.0. The prior iteration of CMMC was CMMC 1.0, which built a framework of four elements: security domains, capabilities, practices
9%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
--server 3.71.72.105 -i kubeletctl pods --cidr 3.71.72.0/24 -i Figure 1: Scanning for nodes to see if they are vulnerable with an exposed kubelet
9%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0 , the short command is ip address
9%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
: The most important tool in IPRoute2 is ip. In many cases, additional options can be set for the show commands. For example, if you only want to output the IP configuration for eth0, the short command
9%
Controlling virtual machines with VNC and Spice
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Oleg Doroshin, 123RF.com
configuration work is necessary on Linux. You need to set up the Vesa driver explicitly in xorg.conf (Listing 1). Listing 1 Vesa Configuration 01 Section "Device" 02 Identifier "device0" 03
9%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
CPU PROCESS/NLWP # 173 daemon 17M 11M sleep 59 0 3:18:42 0.2% rcapd/1 # 17676 apl 6916K 3468K cpu4 59 0 0:00:00 0.1% prstat/1 # ... # ZONEID NPROC SWAP RSS MEMORY TIME
9%
Igel thin clients
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dana Bartekoske, 123RF
. To automate this process on a Windows DHCP server, you can use the netsh command. To create a new reservation, just issue the following: netsh dhcp server scope 10.10.0.0 add reservedip 10.10.47.11 00E0C0E0B0B

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 180 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice