Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (98)
  • Article (44)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 Next »

13%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
, in which you create one or more rules of this type for each logfile with relevant information. Listing 2 Log Entry Examples # Feb 22 08:00:00 hostname sshd[1234]: Failed keyboard
13%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
CentOS 5 to 6 would work – a procedure the release notes advise against – a virtual environment seemed like the prudent decision. The first step is to create a copy of the current system, which should
13%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
into Linux when Linus Torvalds added it to kernel version 2.6.19. GFS2 was thus a later entry to the kernel than the comparable OCFS2, which made it into kernel 2.6.16. In the kernel, GFS relies
13%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
)         libpgmp.so => /opt/pgi/linux86-64/16.10/lib/libpgmp.so (0x00007f5bc5694000)         libnuma.so.1 => /lib64/libnuma.so.1 (0x00007f5bc5467000)         libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f5bc524
13%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
of Kata Containers go back further than 2017, and the project brings together efforts from Intel and the Hyper.sh secure container hosting service: Clear Containers [6] or runV [7]. Kata Containers use
13%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
-interface st0.0; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24; 20 remote 192.168.2.0/24; 21 service any; 22 } 23
13%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
0.499MiB of data (the code would round this down to one decimal place, or 0.0). Figure 6: Analysis highlights from the darshan-job-summary.pl output
13%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
.50 for one hour with 100 instances for Hadoop (100 x US$ 0.015) and up to US$  6.00 for up to 100 instances that run on-demand (100 x US$ 0.06). The bottom line is that you are billed for US$  7.50 per hour
13%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
over the Internet. The first RFCs on IPsec were drafted during the development of IPv6 and date back to 1995. The current version is described by RFC 4301 and later RFCs. The IPsec specification refers
13%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sysconfig/network-scripts/ifcfg-eth0: DEVICE=eth0 HWADDR=00:16:76:D6:C9:45 ONBOOT=yes SLAVE=yes USERCTL=no Master=bond1 /etc/sysconfig/network-scripts/ifcfg-eth1: DEVICE=eth0 HWADDR=00:16:76:D6:C9:45 ONBOOT=yes SLAVE=yes USERCTL

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice