Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kind Man high line mind(711bmw.com)kind Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (339)
  • Article (86)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 43 Next »

14%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
. Something along the lines of: TID PRIO USER DISK READ DISK WRITE IO> COMMAND 18981 be/4 www-data 0.00 B/s 3.92 K/s apache2 -k start Or, if you were trying to see which system user
14%
The Great Resignation
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © ismagalov and Daniil Peshkov, 123RF.com
for those living in lower cost locations rather than adjusting those very high salaries and perks at the top end of the scale. I remember attending a town hall talk a few years ago where a C-Level executive
14%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
It has a number of modes of encryption that provide additional capability beyond just a straight block cipher. You can read about that at an on-line MCrypt man page. Using mcrypt is very similar
14%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
in the background and making it possible for users to take an external disk with their home directories from machine A to machine B and on to machine C without getting into any trouble (Figure 1
14%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
\n\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging
14%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
)\n\Process\: %d (pid %p)\n\User\:%u\n\Host\: %c\n\Date\: $(date)\n\" | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & The SPAWN command has lots of other uses, including communicating
14%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
, C++, and Python. Ganglia has also gained a new web interface with custom graphs. At a high level, Ganglia comprises three parts: The first part is gmond , which is the part of Ganglia that gathers
14%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
-integrated DNS. This process is not tied to consistency checks and opens vectors for all kinds of name spoofing, which in turn is essential for man-in-the-middle attacks. Identical cryptography for NT LAN
14%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
line has just a few columns of output (the man pages for iostat were used for the list below): %user: The percentage of CPU utilization that occurred while executing at the user level (this
14%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
, find the line that begins with email, and replace icinga@localhost with your email address: email @.com By default, notifications in Icinga are not enabled. To do this, you can edit

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice