Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (26)
  • Article (19)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

26%
Warewulf 4
13.12.2022
Home »  HPC  »  Articles  » 
 MB/s |  11 MB     00:05     Rocky Linux 8 - BaseOS                                                1.4 MB/s | 9.0 MB     00:06     Rocky Linux 8 - Extras
26%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
= /var/log/secure maxretry = 5 bantime = 600 Be sure that your logpath is correct and that you set maxretry to a reasonable number and bantime to your own tolerance level. The bantime parameter
26%
An army of Xeon cores to do your bidding
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
RAM, I built a 44-core compute behemoth for less than $600 to run Monte Carlo [1] simulations. Let me dive into the details! Bill of Materials Table 1 details my hardware configuration. I found
26%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
26%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
26%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
and right. Unfortunately, my laptop has a 16:9 display with a resolution of 1,600x900 pixels. Common Denominator Some research on the topic of screen resolution reveals the root cause: the maximum
26%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
}] | |-kata-shim---7*[{kata-shim}] | | `-10*[{containerd-shim}] | `-14*[{containerd}] $ $ docker exec -it kata-fc sh / # / # uname -r 5.4.32 Behind the Scenes An installation of Kata
25%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
.mynet.internal', port '5432'); To create a foreign table, you need to tell the data source which user can log in to the remote PostgreSQL instance and with what combination of role name and password. To do so, you need
25%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
'5432'); To create a foreign table, you need to tell the data source which user can log in to the remote PostgreSQL instance and with what combination of role name and password. To do so, you need a user
25%
Linux Local and Network Filesystems
07.01.2024
Home »  HPC  »  Articles  » 
press the Tab key twice, you will get a list of the filesystems mkfs  currently supports. For example, on my Ubuntu 22.04 system, I get the following output. $ mkfs mkfs

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice