Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 400 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (237)
  • Article (74)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 32 Next »

26%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
X4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (20GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel X
26%
The SDFS deduplicating filesystem
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © maridav, 123RF.com
: mkfs.sdfs --volume-name=pool3 --volume-capacity=400GB \ --chunk-store-local false --cluster-block-replicas=3 If a DSE fails, the others step in to take its place. However, this replication has
26%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
timeout for caches in seconds (default: 20) * -o cache_X_timeout=N Sets timeout for {stat,dir,link} caches * -o compression=BOOL Enables data compression {yes, no} * -o
26%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
26%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
": [ 16 { 17 "GroupName": "RND-Admins" 18 } 19 ] 20 }, 21 { 22 "Path": "/", 23 "UserName": "guido", 24 "Arn": "arn:aws:iam::123456789:user/guido", 25
26%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
-address remotelan; 16 application any; 17 } 18 then { 19 permit; 20 } 21 } 22 } You need to define trustnet and remotelan in the zone address book because Juniper only processes
26%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
]. Distributions in the Microsoft Store Debian GNU/Linux Fedora Remix for WSL Kali Linux Ubuntu 22.04 LTS, 20.04, 20.04 ARM, 18.04, 18.04 ARM, 16.04 SUSE Linux Enterprise Server 15 SP3, 15 SP2
26%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
::min((int) std::numeric_limits::max(), std::max(value, (int) std::numeric_limits::min())); 20 } 21  22 /** 23  * Convolve a grayscale image with a convolution  24  * kernel on the CPU. 25
26%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
of an uncorrectable error by factors of 9–400. Uncorrectable errors following a correctable error are still small at 0.1%–2.3% per year. The incidence of correctable errors increases with age
26%
Combining Directories on a Single Mountpoint
19.05.2014
Home »  HPC  »  Articles  » 
.646 85.747 112.987 131.187 21,533 3,033 SSHFSM OPT1 85.904 88.210 112.963 130.861 20,447 3,315 SSHFS OPT2 111

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice