Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 ... 154 Next »

11%
MapReduce and Hadoop
27.02.2012
Home »  HPC  »  Articles  » 
that possesses a replica of the corresponding block. A mapper processes the contents of a block line by line, interpreting each line as a key-value pair. The actual map function is called individually for each
11%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
to the command line. The focus here is the vboxmanage command; if you call it with the -h parameter set, you are treated to no fewer than 448 lines of commands and parameters. You just need a few of them
11%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
the other roles are assigned to Alice. The end result is a series of calls to the Puppet agent on Alice, Bob, and Charlie. If the Puppet agents there are not running continuously in daemon mode, you might
11%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
-up, as I have in the Bash aliases above. Third, you could create a config file called ~/.iftoprc inside the root user’s home directory (libpcap needs fully elevated access to the interface, so root
11%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
depends on the properties of the file format. Pen testers can use a tool called Metagoofil  to help find metadata on websites. Metagoofil is an information-gathering tool designed for extracting metadata
11%
Greylisting with Postgrey
22.06.2012
Home »  Articles  » 
 
of greylisting, called Postgrey, is no great shakes. The Postgrey site has a great graph showing the effectiveness of greylisting (Figure 1). Figure 1: What
11%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
, to provide some support, and to know when to call for higher level technical assistance. The purpose of this series is to provide Windows admins with the necessary Unix skills to accomplish those goals
11%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
reasonably new – and most probably disruptive – called persistent memory (PM). Looking back at the history of processors, one can see that layers of caching were added to improve performance. The first line
11%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
] usable A dmesg command shows free areas (Listing 1). Areas marked usable can be used by the NVDIMM driver. The last line shows an area of 50GiB usable . Calling memmap=16G!4G reserves 16GiB of RAM starting
11%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
be mounted directly (if it is a device) or mounted using a loopback device (if it is a file). The tool that creates the image is called mksquashfs . It has a number of options that allow control over

« Previous 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice