Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (118)
Keywords

1 2 3 4 5 6 7 ... 12 Next »

100%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
you additionally need in /cgroup. The following command is all the root user needs to run a single command – such as a shell – in an application container: lxc-execute -n foo -f /usr ... 6
99%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
--------- ------ ---- ----- ---- 12 Throughput Cashier Customers 0.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws ... 6
97%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
the Nmap downloads page [6] . Understanding Nmap Scripts Nmap organizes the scanning process into five phases (Figure 1). NSE scripts fall into categories associated with the phases of the scanning ... 6
97%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
total = summary.values.inject(0) { |sum, i| sum += i } 12 puts "Found #{total} instances in the following states:" 13 summary.keys.sort.each do |s| 14 printf "%20s %d\n", s, summary[s] 15 end 16 puts ... 6
96%
RAM revealed
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© KrishnaKumar Sivaraman, 123RF.com
GKF8S 16 DDR3, Registered, ECC, 4 rank 8.710 0.54 AL24M72E4BKH9S 8 DDR3, Registered, ECC, 2 rank 6.132 0.77 AL12M72B8BKH9S ... 6
96%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2 ... 6
96%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
://www.microsoft.com/en-us/office365/deployment-support.aspx Exchange Autodiscover: http://www.msxfaq.de/e2007/autodiscover.htm Office 365 e-book download: http://download.microsoft.com/download/1/2/F/12F1FF78-73E1-4714-9A08-6A76 ... 6
96%
An IT nomad's daily diary
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Kateryna Pruchkovska, 123RF.com
is adding these entries to the Cobbler database. A typical example looks something like Listing 1. Listing 1 System Settings 01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
96%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
virtual network adapters. /p deletes the settings of the virtual network adapter. /n deletes a special network. This tool is particularly useful if you are running Hyper-V on core servers where ... 6
96%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6

1 2 3 4 5 6 7 ... 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice