Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 08 Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (340)
  • Article (49)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 39 Next »

14%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
"data_dir": "/var/consul", 08 "datacenter": "Datacenter-A", 09 "disable_update_check": true, 10 "enable_script_checks": true, 11 "enable_syslog": true, 12 "encrypt": "xxxxxxxxxxxxxx
14%
HDF5 with Python and Fortran
21.03.2017
Home »  HPC  »  Articles  » 
='i') 32      print "dset3.name = ",dset3.name 33    34  # end if The first h5py command is line 12, which opens a file for writing. If the file exists, it will overwrite; if it doesn't exist
14%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
. For other distros, the Ratbox source files are available at the project website [3]. After unzipping, you can install with the classic three-command trick of configure, make, and make install. That Ratbox
14%
Routing with Quagga
19.02.2013
Home »  Articles  » 
OSPF 01 ! 02 hostname linuxrouter 03 password 8 7kdoaul4.iSTg 04 enable password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09  multicast
14%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure 3). The Name section tells you which Metasploit exploits have the best chance to be successfully against
14%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
Pulp, you will find prebuilt RPM packages for Fedora, Red Hat Enterprise Linux, and CentOS [2]. You can access the source code via the Git repository [3]. After downloading the Yum repository
14%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
Resident Pages: 0/15 0/60K 0% 05 Elapsed: 8.1e-05 seconds 06 $ ./vmtouch -vt /bin/gzip 07 /bin/gzip 08 [OOOOOOOOOOOOOOO] 15/15 09 10 Files: 1 11 Directories: 0 12 Touched Pages: 15 (60K) 13
14%
Rethinking RAID (on Linux)
16.03.2021
Home »  HPC  »  Articles  » 
, ioengine=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1) test: (groupid=0, jobs=1): err= 0: pid=5872: Sat Jan  9 16:35:08 2021   read: IOPS=251k, BW=979MiB/s (1026MB/s)(2045MiB/2089msec
14%
Angular 2 client-side TypeScript framework
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
Model)]="model.press" name="press" required size="30" placeholder="mbar"> 07 08 09 10 11 12 13
14%
Web Cryptography API
26.11.2013
Home »  Articles  » 
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice
Date Temperature