Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (887)
  • Article (212)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 121 Next »

9%
Intruder detection with tcpdump
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Monika Wisniewska, 123RF.com
: Figure 4: Header bytes 12-15. # tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2 Figure 5 is an example what this command returns. When capturing data with tcpdump, you can
9%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
of Nagios and I released it. Honestly, I didn't think more than 10 or 12 people would use it. I didn't think anyone would find it interesting, but it started taking off and becoming very popular, and that
9%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
. The following are a few examples to give you an idea of what you can name the extended file attributes for this namespace: user.checksum.md5 user.checksum.sha1 user.checksum.sha256 user
9%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
, this value can also be distorted by CPU scheduling on the hypervisor. RAM: A system with no free RAM is not good. If the Available MBytes value is clearly and permanently less than 256, action is required
9%
Software RAID in Windows, macOS, and Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Mirko Blicke on Unsplash
-b 4096 -E stride=128,stripe-width=256 /dev/md0 To mount the RAID, enter: mkdir /mnt/raid mount /dev/md0 /mnt/raid Finally, to mount the RAID automatically when you boot your Linux computer, add
9%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and a user type (admin or normal). The hash is a SHA-256 hash of the password. Listing 1 shows an example configuration. Listing 1 Example auth Element appConfig: auth: users
9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. If needed, you can create more users. The settings for this can be found in the USERS subsection. Each user entry consists of the following data: Username:sha256(Password):UID:filter_netmask The UID value
9%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
Yes, Blowfish Yes, AES256 No Searching By file name In browser and in client via OS In browser and in client via OS In client via OS For metadata
9%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
Ubuntu Server 12.04 LTS Precise Pangolin, and I'm assuming you have built your server and patched it as follows before continuing with this exercise: primary:~#aptitude update && aptitude dist
9%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
to process, and the longest you want a client to wait for the result is 10 minutes. Without changing the number of instances, the average wait time for the requests in the queue is [4 x (3 + 6 + 9 + 12 + 15

« Previous 1 ... 88 89 90 91 92 93 94 95 96 97 98 99 100 101 ... 121 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice