Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (80)
Keywords

1 2 3 4 5 6 7 8 Next »

100%
Automating Migration to openEuler
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Chris Briggs on Unsplash
Rubén Llorente ... for servers; and the x2openEuler migration tool. In this article, I explain how to use x2openEuler to migrate a small fleet of CentOS 7 servers to openEuler. Your Migration Plan Traditionally, upgrading ... Easily migrate your old CentOS 7 systems to the modern openEuler with the x2openEuler migration toolset. ... 90 ... x2openEuler Migration
56%
A first look at Apache 2.4: Web server for the cloud
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Helder Almeida, 123RF.com
for their documentation. Although at times it's a bit terse, it is very complete. The Apache 2.4 release, although a fairly modest bump compared with the move from the 1.x series to 2.0.x, is a pretty important release ... High performance and cloud suitability are the thrust of Apache 2.4. We give you the lowdown on transitioning your Apache HTTP Server from 2.2 to 2.4.
55%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
SyslogFacility AUTH 20 TCPKeepAlive yes 21 UseDNS no 22 UsePrivilegeSeparation yes 23 Subsystem sftp /usr/local/libexec/sftp-server 24 Match Group sftponly 25 ChrootDirectory /export
54%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Dmitry Tsvetkov, 123RF.com
/usr/lib/vmware/bin/vmware-hostd |awk '{print $3}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\n' -qf |sort -u 20 glibc 21 libgcc 22 libstdc++ 23 libxml2 24 nss-softokn-freebl 25 zlib 26 ... VMware Server 2.0 on recent Linux distributions
53%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
) }' -c '/bin/ls -l' total 20 -rw-rw-r--. 1 tscherf tscherf 18216 2010-04-12 09:02 systemtap.txt clone_quoting_options o=0x0 clone_quoting_options o=0x0 Cross-Compiling If you want to run a System
53%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
As of kernel 2.4.x As of kernel 2.2.x Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu BSD – FreeBSD, NetBSD, OpenBSD No No Free
52%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
and arrival rate 19 $pdq::streams = pdq::CreateOpen($Workload, $ArrivalRate); 20 # Define the service rate for customers at the cash desk 21 pdq::SetDemand($ServerName, $Workload, $SeviceTime); 22
51%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
X4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (20GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel X
49%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
) (out= 131)(deflated 17%) adding: WEB-INF/(in = 0) (out= 0)(stored 0%) adding: WEB-INF/web.xml(in = 63) (out= 48)(deflated 23%) # cp helloworld.war ../../jboss-5.1.0.GA/server/all/deploy/ 20
46%
System monitoring with Sysinternals
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Denis Tevekov, 123RF.com
lists locally logged in users only; -x leaves out the login times. The PsLoggedOn tool is useful when you need to investigate unauthorized access to your network and see the computers on which a user

1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice