Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (133)
  • Article (45)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 Next »

14%
Routing with Quagga
19.02.2013
Home »  Articles  » 
to a 100Mb network, the path through the faster router wins. Where the paths are equivalent, the administrator can manually add a weighting value to the configuration, which is then reflected in the LSA
14%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
to see what might be causing the load. Figure 8: Disk stats and top processes. One last option I want to cover is n , for network stats. Figure 9
14%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions
14%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
[laytonjb@n0001 ~]$ module avail ------------------------------- /opt/Modules/versions ------------------------------ 3.2.9 --------------------------- /opt/Modules/3.2.9/modulefiles
14%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
public key has been saved in eks-ssh.pub. 09 The key fingerprint is: 10 SHA256:Pidrw9+MRSPqU7vvIB7Ed6Al1U1Hts1u7xjVEfiM1uI 11 The key's randomart image is: 12 +---[RSA 4096]----+ 13 | .. ooo+| 14
14%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
), the venerable ZAP (automated security testing) [9], and Zenmap (a graphical front end to the prodigious and unmatched Nmap security tool). A click on the Auditing link in the right-hand menu presents
14%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
command: # sockstat | grep "\*:[0-9]" The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service: inetd_flags="-wW -a
14%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
6), and start stream blocking (line 7), which executes the command and waits for the response. Now, write the output to a variable (lines 9-12), close the stream (line 14), and send the response
14%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
Inventory suite using open source software that includes SQLite, Ruby, and Apache. The spiceworks.exe application is a single, small (66MB) Windows executable file that installs and scans your network devices
14%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power outage

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice