Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (100)
  • Article (44)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 Next »

13%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
:/ 1 -rw- 4414921 Aug 22 2017 00:00:02 c2960-lanbase-mz.122-25.FX.bin 2 -rw- 736 Aug 22 2017 10:53:02 vlan.dat 64016384 bytes total (59600727 bytes free) If you
13%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
13%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
2P). Listing 2P: Python Code Example with Output in Loop (One-by-One) 1 #!/usr/bin/python 2 3 if __name__ == "__main__": 4 5 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0}; 6 7 counter
13%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
): 11 12 s = 0.0 13 s += h * f(a) 14 for i in range(1, n): 15 s += 2.0 * h * f(a + i*h) 16 # end for 17 s += h * f(b) 18 return (s/2.) 19 # end def 20 21 22 # Main section 23 comm = MPI
13%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
13%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
/sbin/named ... 774 ?? SsJ 0:00,12 /usr/sbin/sshd ... 781 ?? IsJ 0:00,87 /usr/sbin/cron -s ... The jls command lets you view all the currently active jails, as shown in Listing 6. Listing 6 Active Jails
13%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
meet some disk space requirements for installing DNF, as well: at least 512MB of free space available in /tmp, /opt, and /var. If necessary, increase the amount of free disk space in each filesystem
13%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
_ADMIN=admin 10 - KEYCLOAK_ADMIN_PASSWORD=SOME_PASSWORD 11 - KC_DB=postgres 12 - KC_DB_URL=jdbc:postgresql://postgres:5432/keycloak 13 - KC_DB_USERNAME=postgres 14 - KC
13%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
. In my case, I followed the installation instructions for CentOS on my CentOS 6.4 system. The instructions are very good and very accurate – be sure you read all of it before trying to install s3q l
13%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
server with a compromised MySQL binary. A forensics professional informed me that the following strings belonged to a Trojan: 7A 50 15 00 40 00 67 30 15 02 11 9E 68 2B C2 99 6A 59 F7 F9 8D 30

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice