Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3%A9n Llorente 48 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (10)
Keywords
100%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
chips with 128Mx8 organization (1-Gb chips) 5.132 2.57 AL28M72A8BJH9S 1 DDR3, Registered, ECC, 1 rank 2.241 2.24 AQ12M72E8BKH9S 4
98%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
25-E SSD [9] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks 3.3.1-MPI [11] Iozone [12] Daemon ... 9
91%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
--------- ------ ---- ----- ---- 12 Throughput Cashier Customers 0.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws
91%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
example, Mar 25, 2011, PrivateKeyEntry, 33 Certificate fingerprint (MD5): AC:D5:CB:5C:13:9D:EF:F2:85:6B:AB:89:49:F8:48:3A Finally, to enable the web connector's HTTPS port, you need to add
89%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
87%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3
86%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
thus assumed an upgrade scenario that included replacing the motherboard with on-board graphics and sound, the CPU, the RAM (1,024MB), and the hard disk (320GB). After investigating prices, the authors ... 3
86%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
's with all the colons? Well, put simply, IPv4 addresses are short, so writing out the entire address is easy. With IPv6, however, you get something like 1.2.3.4.5.6.7.8.9.234.25.198.221.82.15.16. To make ... 3
85%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
" domain="kvm-node1"/> 47 48 49 50 51 --> 52
85%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
_ERR_GENERIC;; 37 3) return $OCF_NOT_RUNNING;; 38 esac 39 fi 40 41 ocf_log debug "Asterisk PBX monitor succeeded" 42 return $OCF_SUCCESS 43 } Listing 9 asterisk

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice