Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (61)
  • Article (1)
Keywords

1 2 3 4 5 6 7 Next »

100%
Can your web server be toppled with a single command?
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Almagami, 123RF.com
the granular tweaking this approach offers. Listing 1 IPtables Ruleset 01 iptables -A INPUT -p tcp -m multiport --dport 80,443 -m state --state NEW -m limit --limit 100/minute --limit-burst 300 -j ... 6
98%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
240 240 Still unknown Operating voltage (V) 2.5 1.8 1.5 (DDR3L: 1.35; DDR3U: 1.25) 1.2 Chip (I/O clock frequency, MHz) DDR-200 (100)DDR-266 ... 6
98%
News
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
, the data center uses 38 percent less energy to do the same work as the company's existing facilities. Noteworthy features include: 100 percent outside air evaporative cooling; custom servers that use 38 ... 6
98%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
100 0.067 95 23 5 10 99 0.099 96 22 6 20 94 0.210 97 22 6 Unfortunately ... 6
98%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
to admit that Linux didn't offer this feature. But in 2006, Rohit Seth started to develop this functionality, and as of kernel 2.6.24, administrators can use it. Originally referred to as "process containers ... 6
98%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
97%
The Ruby Version Manager (RVM) hands-on
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
©Mettusr, 123RF.com
and Curl up front. On Debian/Ubuntu you can prepare the system for the RVM installation by typing: apt-get install curl git-core If you follow the official "Quick Installation" method [6], you then call ... 6
97%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
100ms. To toggle the display between a line, a histogram bar, and the report, use the Performance Monitor tool bar (Figure 3). This makes it easier to get an overview if a specific server is having ... 6
72%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
100.net) 56 data bytes 03 64 bytes from iy-in-x63.1e100.net: icmp_seq=1 ttl=52 time=99.6 ms 04 64 bytes from iy-in-x63.1e100.net: icmp_seq=2 ttl=52 time=100 ms 05 64 bytes from iy-in-x63.1e100.net: icmp ... Transitioning from IPv4 to IPv6 will be messy; we describe IPv6 served three ways. ... IPv6 ... IPv6 and Linux
66%
Automating Migration to openEuler
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Chris Briggs on Unsplash
Rubén Llorente ... page that will show a global report of the ongoing testing. From here, you can check individual servers for an in-depth detailed view of their status (Figure 6

1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice