Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1281)
  • Article (341)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 183 Next »

13%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
(Figure 3). In this way, you can also query websites, Outlook Web App, intranet sites, and SharePoint libraries. Figure 3: Monitoring various protocols
13%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
in the network properties, thus forcing Internet Explorer to use the proxy. If Windows 7 fails to find a DNS server, it uses three standard addresses as its name servers: fec0::1 , fec0::2 and fec0::3
13%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
as in Figure 3. Figure 3: Values passed from the instrumented benchmark to statsd, and then to Graphite. Listing 2: Instrumentation with Perl #!/usr
13%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
and architecture are available at http://www.lbl.gov/cs/html/greenflash.html, and you can read the complete research paper online at http://james.agu.org/index.php/JAMES/article/view/v3n12/v3n12HTML.
13%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
is in $PATH and where it is located. For example, look for perl (Figure 3). Notice that the output tells you where the man pages are located, as well as the binary
13%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
this module, the module files under compiler  are available, but only those associated with gnu/8.5/  (Figure 3).  Figure 2: Path to the gnu/8.5 module
13%
TUI Tools for Containers
07.10.2024
Home »  HPC  »  Articles  » 
nice charting capability that I really like (Figure 3). Figure 3: bottom. To me, the layout is a little cleaner than bashtop . The
13%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks. In an article from 2015 [4], ADMIN looked into the topic of managing Linux servers with Cockpit; since then
13%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
the servers to the console through the agent. (3) Use "bouncers" to prevent attacks actively, wherein the system simply blocks certain IP addresses. Typically, you can use the package manager to install Crowd
13%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database. Figure 1: An image scan with Trivy generates a long list of vulnerabilities

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice