Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (46)
Keywords

« Previous 1 2 3 4 5 Next »

91%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
); i+= 4096) newblock[i] = 'Y'; 12 printf("Allocated %d MB\n", allocation); 13 } 14 } Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM
90%
Boost performance of your Python programs
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Eric Isselée, 123RF
(number, label): 07 for i in xrange(number): 08 print ' ' + str(i) + ' ' + label 09 sleep((number - 15)/10.0) 10 11 if '__main__' == __name__: 12 13 p1 = Process(target = count, args = (20
90%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
: -p localhost-20120310-133840.raw.gz -P -f ./PLOT -ocz 06 # Host: localhost DaemonOpts: 07 # Distro: Scientific Linux release 6.2 (Carbon) Platform: GA-MA78GM-US2H 08 # Date: 20120310-133840 Secs
90%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
90%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
an Asterisk PBX as an HA resource 07 # 08 # Authors: Martin Gerhard Loschwitz 09 # Florian Haas 10 # 11 # Support: linux-ha@lists.linux-ha.org 12 # License: GNU General Public
90%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
08 default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11 12 clean: 13 rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
89%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
$spin 08 @$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
89%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
the Buffer 01 [global] 02 ioengine=libaio 03 direct=1 04 filename=testfile 05 size=2g 06 bs=4m 07 08 refill_buffers=1 09 10 [write] 11 rw=write 12 write_bw_log 13 14 [read] 15 stonewall 16 rw=read 17 write
89%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
endpoint1=192.168.80.0/24 07 endpoint2=192.168.2.0/24 08 action=requireinrequireout 09 auth1=computerpsk 10 auth1psk="test123" 11 qmsecmethods=esp:sha1-3des 12 qmpfs=dhgroup2 If you need
89%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
, some parts of which are standardized and some of which are defined by the device manufacturer. In production, the Standard MIB II ranges (1.3.6.1.2.1.*) and the vendor-specific area below

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice