Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 149 Next »

12%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
the associated network can connect to the GreenSQL server. It is possible to restrict GreenSQL, without further firewall rules, to a single IP address or localhost. Certificates help to verify the authenticity
12%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
. The default on Linux is to fill up your local hosts table with what are effectively black-hole routes to a non-existent IP address on your local area network (so a route already exists in the hosts table
12%
SGI Interview: SGI VP Bill Mannel talks about Altix ICE
12.11.2011
Home »  HPC  »  Vendors  »  SGI  » 
 
of Linux across an internal network that is not used for compute, because the compute goes to the InfiniBand side of the house. And they can boot themselves. So, the beauty of this is that, on a rack by rack
12%
Microsoft System Center Virtual Machine Manager 2008 R2
14.07.2011
Home »  CloudAge  »  Articles  » 
 
in nonmember networks. In this case, you'll need to install the agents manually because automatic installation only works inside the domain. SCVMM relies on Microsoft SQL Server to store data. Depending
12%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
is causing the core to become idle. The reasons for CPU utilization to drop could be from waiting on I/O (reads or writes) or because of network traffic from one node to another (possibly MPI communication
12%
AlmaLinux and HPC
31.01.2024
Home »  HPC  »  Articles  » 
for Internet Security (CIS) Benchmarks, a set of guidelines that help secure systems, software, and networks against evolving cyberthreats. With help from CloudLinux, AlmaLinux 9 OS also has achieved Federal
12%
Write Your Own Admin Tools
02.03.2024
Home »  HPC  »  Articles  » 
) cross-platform (Linux, Windows, macOS, various BSDs, Solaris, and AIX) extension library gathers information on running processes and system metrics such as CPU, memory, disk, network, and sensor. You can write all sorts
12%
Cluster-Aware Updating for Windows Server 2012 R2
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © bahri altay, 123RF.com
cluster nodes in the network can cope with the additional load if a node is shut down for upgrades and its resources are distributed in the cluster. Infos CAU options in TechNet: http
12%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
the developers, a role model already exists for a network in which the two endpoints can communicate anonymously with one another without being monitored: Tor. The makers of DIME, led by Levison, described DIME
12%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
.service 01 [Unit] 02 Description=Watchman 03 After=network.target 04 05 [Service] 06 Type=simple 07 User=root 08 ExecStart=/usr/local/bin/watchman --log-level 1 watch-list -f 09 Exec

« Previous 1 ... 122 123 124 125 126 127 128 129 130 131 132 133 134 135 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice