Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 171 Next »

12%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
determine CPU utilization or free RAM, the number of network packets transmitted, or the speed of disk I/O. Installation Sar is included in the repositories of all well-known Linux distributions
12%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
, and systemd. Drawing on more tools from the libguestfs package, virt-builder modifies the template to suit the administrator’s needs – for example, setting the root password, configuring the network, and so on
12%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
to allow access to a terminal. Here, I start a netcat listener on the Linux box and connect to it with: $ ncat 10.9.11.32 5555 Again, I can use -- ssl to hide my conversation from a sniffer on the network
12%
Book Review: Land of Lisp
14.09.2011
Home »  Articles  » 
 
in their Computer Science track coursework. Just in my local neighborhood, I can point to a major airfare engine and an even larger distributed network infrastructure provider that makes use of Lisp code
12%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
and integrity requirements. Traditional availability hasn't really been addressed by the security side of operations; instead, this is usually left to the server and network admins, at least until an attack takes
12%
Killing Instances with Chaos Monkey
28.06.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
by pushing your code to CloudServers or EC2. Resilience is built in at the hardware level in most cloud offerings. Disks fail, network connections drop out, and through the magic of your cloud provider, you
12%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, real-time updates, and the appearance of 10Gb networks (or even some 100Gbps backbones) have changed the shape of the web. The IETF Working Group “Hypertext Transfer Protocol Bis (httpbis)” is looking
12%
Container Apps
02.10.2017
Home »  Articles  » 
 
 core  or ubuntu-core  snap. It offers other snaps a read-only filesystem that can also rely on basic libraries, an init package (systemd), and networking. This is called an OS snap,because it is a minimal
12%
ownCloud
06.01.2012
Home »  Articles  » 
 
network by supporting sharing and collaboration between users. The web interface helps administrators manage users and groups and restrict their storage resources using quotas. ownCloud also supports LDAP
12%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
sometimes shared across cores, chip and module interconnections, network connections, Peripheral Component Interconnect Express (PCIe) switches, and more. These elements are connected in various ways

« Previous 1 ... 124 125 126 127 128 129 130 131 132 133 134 135 136 137 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice