Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1321)
  • Article (314)
  • News (201)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 184 Next »

9%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
; for further details, see my OSSEC article in the ISSA Journal [6]. Download the latest version of OSSEC and execute the following: tar -zxvf ossec-hids-*.tar.gz cd ossec-hids-* sudo ./install.sh Choose
9%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
to sorted sequence table (SST) files as soon as it reaches a certain size (128MB by default), creating many SST files with all intermediate versions. To limit the amount of data, these files are compressed
9%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.request.size Limit the number and size of batches (record-size-max). Time spent waiting for I/O Are you really waiting (io-wait-ratio)? buffer.memory + queued requests 32MB default (roughly
9%
PC over IP
03.09.2013
Home »  Articles  » 
 
. In the Manage Devices section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6). Figure 6: Simple but functional
9%
SSH on Windows
17.09.2013
Home »  Articles  » 
with ssh-agent ; the -l option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
9%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
9%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6). Figure 6: Registered attacks on various ports
9%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
.tool The output is given in JSON format (Figure 5), so piping it to python -m json.tool makes the output readable (Figure 6). Figure 5: Performance data queried
9%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
9%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
a “wrapper function” for the library in Python (Listing 6). Listing 6: Wrapper Function import ctypes   _sum = ctypes.CDLL('libsum.so') _sum.sum_function

« Previous 1 ... 154 155 156 157 158 159 160 161 162 163 164 165 166 167 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice