Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 201 Next »

17%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
to an unwelcome high. That said, iftop is incredibly stable when used on production routers under high network load. Figure 4 illustrates the iftop default view, which omits source and destination port numbers
17%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
found (potential users) along with path disclosures (see Figure 4). Figure 4: Finding potential users and path disclosures. Accounts and Hostnames
17%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
that has read-only privileges for everyone has permissions r--r--r-- . In Unix, file permissions are also assigned numbers: r = 4 , w = 2 , and x = 1 . For any file you create, that file has a permission
17%
Stat-like Tools for Admins
19.11.2014
Home »  HPC  »  Articles  » 
. By default, vmstat uses kibibytes (KiB) [4], or 1024 bytes (-S K ). You can change that to kilobytes (-S k ), megabytes (-S m ), or mebibytes (-S M ). If you suspect server swapping (i.e., virtual memory usage
17%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
From the 1990s A, B, C Standard 4x size increases going from one class to the next D, E, F Large ~16x size increases from each of the previous classes
17%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
of cache from L1, to L2, to L3 (and even L4) before going to main memory. Current CPUs also have several cores per processor. Although CPU improvements have brought wonderful gains in performance, the desire
17%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
efficiency, along with simpler management, explains the meteoric rise of Docker [3], LXD [4], OpenStack [5], and other container-based tools: Everything called a "container" is currently very popular
17%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
From the 1990s A, B, C Standard 4x size increases going from one class to the next D, E, F Large ~16x size increases from each of the previous classes
17%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
of the TICK Stack is the InfluxDB time series database [4]. Note that time series databases do not use tables, like classical databases, as a central element for data management; instead, they align all stored
17%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
are encrypted and combined with each other more than 4,096 times. The protections this method offers are considerable and not easy to circumvent, but hackers do not necessarily fail here either. To test the WPA2

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice