Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente 08 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (319)
  • Article (47)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 37 Next »

16%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
: 1386145 0 IO-APIC-edge pata_sch 07 15: 0 0 IO-APIC-edge pata_sch 08 16: 9 0 IO-APIC-fasteoi pciehp 09 17: 3398067 0 IO
16%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
these images with the Trivy command-line interface (CLI), the current official Debian image tallies 81 vulnerabilities (61 low, 16 high, and four critical). Ubuntu does very well with only 17 (15 low and two
16%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
/openvpn/keys/CA.crt 08 cert /etc/openvpn/keys/server.crt 09 key /etc/openvpn/keys/server.key 10 tls-auth /etc/openvpn/keys/tls-auth.key 11 12 server 192.168.1.0 255.255.255.0 13 14 keepalive 10 60 15 comp-lzo 16 17
16%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
 3.5.0-44-generic (hercules)         03.12.2013      _x86_64_        (2 CPU)    09:46:03      runq-sz  plist-sz   ldavg-1   ldavg-5  ldavg-15   blocked 09:46:13
16%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
://en.wikipedia.org/wiki/Role-based_access_control Docker security plans: http://opensource.com/business/15/3/docker-security-future Content Trust: https://blog.docker.com/2015/08/content-trust-docker-1-8/ OCI: https
16%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
%iowait %steal %idle 12:15:01 all 2.08 0.00 0.96 0.02 0.00 96.94 12:25:01 all 1.96 0.00 0.82 0.06 0.00 97.16 12:35:01 PM
16%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
                                                              ^ 08 HINT:  There is an entry for table "a", but it cannot be referenced from this part of the query. 09  10  11 # But LATERAL makes this join correct: 12  13  14 SELECT 15    a.id, a.name, t
16%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
password => '********', 08 keyspace => 'pingtest' 09 ); 10 11 $client->connect; 12 13 foreach my $line ( ) { 14 if($line =~ /\[(\d+.\d+)\](.*)time=(\d+\.\d+)/) { 15 $client
16%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
: lo: mtu 65536 qdisc noqueue state UNKNOWN group default 06 inet 127.0.0.1/8 scope host lo 07 valid_lft forever preferred_lft forever 08 3: eth1:
16%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
CREATE OR REPLACE FUNCTION burncpu (tm INTERVAL) 02 RETURNS INTERVAL AS $CODE$ 03 DECLARE 04 stmp TIMESTAMP := now()+tm; 05 i INT; 06 BEGIN 07 WHILE clock_timestamp()08 i:=1; 09

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice