Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 171 Next »

12%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
or failing. To see Monitoror yourself in action, use a terminal command to create a Docker network for test container(s): docker network create statuspage-demo Next, create the monitoror_stack.yml and config
12%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
of credit card payment transactions – calls for a two-factor authentication solution for network access by administrators, staff, and external third parties [2]. Many two-factor authentication solutions
12%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
systems and performance. With so many options and so many key aspects to HPC storage, a logical question you might ask is: Where should I start? Will a NAS (Network Attached Storage) solution work for my
12%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
also run Splunk as a light-forwarding agent. Windows and *nix hosts can also be monitored with Snare agents. Windows and *nix hosts can be monitored with OSSEC agents. Network devices can send
12%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
targeted policy is designed to affect only specific daemons running on the system – typically those operating services that are listening on network sockets and are therefore potential entry points
12%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
performance, and multiple network connections (because of multiple nodes), all of which can greatly improve storage performance. However, if I try to Gzip a file on a node with 64 cores, the process still only
12%
SSH on Windows
17.09.2013
Home »  Articles  » 
the “WinSSH” box). Installing the executable binary needs no explanation; no launcher is needed because Swish simply appears as a new network drive called Swish. When you click, you first see an empty drive
12%
Live Migration
18.02.2014
Home »  Articles  » 
from one host to another during the game, caused a sensation. The effective downtime for the client was a few seconds, which could be mistaken as a hiccup on the network. Admins enjoy live migration
12%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
if something is wrong with the network or power connection in the cluster. Sometimes, several computers fail simultaneously for the same reason; this kind of incident would look very similar in the Ceph status
12%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
without fighting over the physical network interface (Figure 1). Of course, simulating computer components is heavy on CPU cycles. To improve the execution speed of the guest operating systems, Qemu hands

« Previous 1 ... 113 114 115 116 117 118 119 120 121 122 123 124 125 126 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice