Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (750)
  • Article (171)
  • News (84)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 Next »

17%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
/usr/lib64/ruby/1.8/logger.rb:487:in `initialize' 12 /usr/lib64/ruby/1.8/logger.rb:263:in `new' 13 /usr/lib64/ruby/1.8/logger.rb:263:in `initialize' 14 /usr/lib/nagios
17%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
10 11 12 13 14 15 16
17%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
://www.un.org/apps/news/infocus/sgspeeches/ "Apache ModSecurity with GeoIP blocking country specific traffic: ModSecurity + GeoIP" by Suvabrata Mukherjee: http://linuxhelp123.wordpress.com/2008/12/11/apache The Author Sebastian
17%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache. I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup
17%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
AdvAutonomous on; 10 AdvRouterAddr off; 11 }; 12 13 }; IPv6 Attacks IPv6 basically suffers from all the existing classes of attacks against IPv4 and also introduces some new weaknesses
17%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
the file sizes (converted to and labeled GB), separating the two items of information with a tab. Invoking this script for user chavez yields: chavez 12.12537GB Such commands are often useful in loops
17%
Reading email in the browser with Horde
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
©Daniel Villeneuve, 123RF.com
, 09 'protocol' => 'imap', 10 'port' => 143, 11 // Plaintext logins are disabled by default on 12 // IMAP servers (see RFC 3501 [6.2.3]) 13 'secure' => 'tls', 14 'maildomain
17%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
=> _.,n,GotoIf($[${usercaptcha} == ${captcha}]?correct:wrong) 10 exten => _.,n(wrong),Playback(privacy-incorrect) 11 exten => _.,n,HangUp() 12 exten => _.,n(correct),agi,addwhitelist.sh|${CALLERID(all)} 13
17%
Modern MySQL Forks and Patches
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Dmitry Karasew, 123RF.com
replication mechanisms. One feature that stands out is the ability to perform rabbit replication to NoSQL databases such as Voldemort [12] or services such as Memcached [13]; thus, you would be able
17%
Operating system virtualization with OpenVZ
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© sculpies, Fotolia.com
.g., for migrating over secure connections). The exact syntax and other examples of applications are discussed [12]. Additionally, OpenVZ can create what it refers to as checkpoints (snapshots) of VEs: A checkpoint

« Previous 1 ... 93 94 95 96 97 98 99 100 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice