Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (261)
  • Article (130)
  • Blog post (2)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

29%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L3 caches across all cores or shared L2 and L1 caches
29%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
.000000, 1.000000) (n_pre, n_post) = (1, 1) dim             = 3 solver ID       = 0 ============================================= Struct Interface: ============================================= Struct
29%
Automated builds using CentOS 7 and Kickstart
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Icetray, fotolia.com
. Here are the steps involved in installing CentOS 7: 1. Download the ISO [2]. 2. Burn the ISO to DVD. 3. Configure the server to boot from DVD. 4. Start the install. Once the server boots, you'll see
29%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
. If you like, extended attributes add metadata to a file or directory, going beyond the definition of the inode. Many Linux filesystems can use extended attributes: ext2 ext3 ext4 JFS
29%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, and there are several implementations [3]. What Happened Thus Far Figure 1 shows a typical setup with port knocking. The components involved here are the client and the server application, with a firewall to keep out
29%
Importing SSH keys on AWS
05.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
DEjAhocW2hraXMIIEowIBAAKCAQEAhXo2cUYv B8/P/BP0ges6i7VJ9Oj1bDHfILtu805syqwN5J6IBcgvesthq4Xpj4zuIVsCctU5SEIkx9texM+b .... fuy3QFJdl3rM0w/ry1QDRy5WgfZsIpAQZUuCaZgZx2BavviuVcFGrd67RfP6gt2yBk7EhN0gQCN2 X5
29%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
-time password (OTP), is transmitted in plain text in addition to the user password. RFC 6113 [3] defines the flexible authentication secure tunneling (FAST) pre-authentication method for this approach
29%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
flexible, and is very fast at imaging nodes. The latest version of Warewulf, the version 3.x series, has some new and updated capability to make things even easier and more flexible. Warewulf supports
29%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
. To install the OpenEBS components in the cluster, use either the Kubernetes package manager Helm version 2 or 3 or the YAML file of the OpenEBS operator. Instead of a default installation, you can also perform
29%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
 keysize = 16 (not loaded) Selection [aes]: 1 Select key bytes:   1) 16  2) 32  3) 24 Selection [16]: 2 Enable plaintext passthrough (y/n) [n]: n Enable filename encryption (y/n) [n]: n Attempting

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice