Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 000 Llorente"52 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (40)
  • Article (2)
Keywords

1 2 3 4 5 Next »

100%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
magazine [3]. In other words, the many Cobbler system records are really the biggest problem. Just to jog your memory: Using system records, Cobbler can create an individual PXE configuration file for each
97%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
crack attempt using the supplied password list file, password.lst. This list contains more than 3,000 commonly used passwords (Listing 2). Listing 2 Cracking with the Password List File 01
94%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
it is a little bigger, at 31899301. Listing 3: Files in the Compressed Archive laytonjb@laytonjb:~/DATA_STORE$ ls -lstar total 62316 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2 09:52 data1_08022025.tar
93%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
is capable of executing jobs at a very high speed. I have used the framework in an environment with more than 3,000 systems; running a job on all of the nodes rarely took more than 30 seconds. YAML
92%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
" domain="kvm-node1"/> 47 48 49 50 51 --> 52
91%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2
91%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
an "Enterprise" package that includes more than US$ 75,000 in free office space and tech tools, an Atlassian Bitbucket account or JIRA Studio accounts, Zimbra-hosted email, and (equally important for a start-up) T ... 3
91%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
a full HTTP request directly to the server, Slowloris begins a request and then continuously, but very slowly, adds headers without ever completing the request; (3) the server fields all of the header data
91%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
.500 1 192.168.56.103:3306 : 1.000 0.500 1 ---------------------------------------------------- Destinations: 3, total connections: 4 and echo getstats | nc -q 1 127.0.0.1 4444 in: 37349
91%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
of the hardware, which would make purchasing new machines at more than EUR 17,000 more expensive than upgrading (Table 3). Table 3 TCO for Small Business   Purchase Upgrade ... 3

1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice