Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%C3%A9n Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (235)
  • Article (81)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 32 Next »

50%
Network traffic utilities bandwhich and iftop
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Ildar Galeev, 123RF.com
this problem, so I decided to take that route instead of installing Cargo. From the Releases page [3] on the GitHub, repository you can see the latest build. In my case, that was version 0.9.0 at the time
50%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
but independently of one another (Figure 2). Table 3 Gang Execution Fortran C !$acc parallel do i=1,n ! do something enddo!$acc end parallel pragma acc parallel{ for (int i=0; i
49%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
.atlanta.com:5060; branch=z9hG4bKnashds8 03 Max-Forwards: 70 04 To: Bob 05 From: Alice ;tag=1928301774 06 Call-ID: a84b4c76e66710 07 CSeq: 314159 INVITE 08 Contact
49%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
: 09 bb:0f:e3:7f:3e:ab:c3:5d:32:78:85:04:a2:da:f1:61 root@host1 You need to distribute the public part, that is the /root/.ssh/id_rsa_cluster.pub file, to all nodes in the cluster. The Strict
49%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
, or User scopes). These include custom dimensions: 1. srcaddr 2. dstaddr 3. srcport 4. dstport 5. protocol 6. exporter_id 7. input_if 8. output_if 9. tos and custom metrics: 1. bytes (integer) 2
49%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
Ripgrep gives you by default, set the -C <n> option, where <n> denotes the number of lines before and after the location you want to view. To check a certain number of lines exclusively before the find
49%
Getting started with I/O profiling
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Photosani, Fotolia.com
2 2 3 512KB < < 1MB 3 2 2 3 2 4 3 4 1MB < < 10MB 87 87 87 84 74 67
49%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
B) copied, 1.99686 s, 210 MB/s Infos "Data Compression as a CPU Benchmark" by Federico Lucifredi, ADMIN , issue 66, 2021, pg. 94, https://www.admin-magazine.com/Archive/2021/66/Data-Compression-as-a
49%
Monitoring with Zabbix
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Les Cunliffe, 123RF.com
types (geographical, infrastructure, and so on), which is part of the default installation scope. Shapes and Sizes Zabbix is released under the GNU GPL, and the latest version 1.8.9 can be downloaded
49%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1 ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice