Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (898)
  • Article (272)
  • News (38)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 122 Next »

25%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
rewinddir 0 0 0 0 0 0 0 0 fsync 21 21 21 21 21 22 26 31 lseekm 3
25%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
rewinddir 0 0 0 0 0 0 0 0 fsync 21 21 21 21 21 22 26 31 lseekm 3
25%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
buffered disk reads: 616 MB in 3.00 seconds = 205.03 MB/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292 MB in 2.00 seconds = 3153.09 MB/sec If this were a spinning disk, you would also
25%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... to CloudFlare CEO Matthew Prince, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, which allows them to work around conventional defense mechanisms. We explain how a DDoS attack
25%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
; in Listing 3, the bridge device is then configured with its IP address and other parameters. Listing 2 Network Configuration (1) [Match] Name=enp2s25 [Network] Bridge=docker0 Listing 3
25%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
] Name=docker0 [Network] DNS=192.168.100.1 Address=192.168.100.42/24 Gateway=192.168.100.1 Listing 3 Network Configuration (2) [Match] Name=enp2s25 [Network] Bridge=docker0
25%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
, you can define the following anti-spoofing rules: # Anti-spoofing ip6tables -A INPUT ! -i lo -s ::1/128 -j DROP ip6tables -A INPUT -i $WAN_IF -s FC00::/7 -j DROP ip6tables -A FORWARD -s ::1/128 -j DROP ... We design a basic set of ip6tables rules for an IPv6 firewall. ... ip6tables Rules ... IPv6 Tables ... Creating Firewall Rules with ip6tables
25%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
There’s no such thing as a homogeneous server environment. Windows administrators must learn basic Linux commands and navigation to support a contemporary network fully. ... . That’s a good thing for cross-platform system administrators who must work on a variety of systems without becoming an expert on every one. By convergence, I mean that there is more of a standard look ... There’s no such thing as a homogeneous server environment. Windows administrators must learn basic Linux commands and navigation to support a contemporary network fully.
24%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0 2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0 2012-01-09 21
24%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
, with the use of chkconfig, that ganglia always starts when the master node boots: [root@test1 ganglia]# chkconfig --list | more NetworkManager 0:off 1:off 2:on 3:on 4:on 5:on 6:off acpid

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 122 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice