Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%3 08 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (284)
  • Article (76)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 37 Next »

18%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
 -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9 option (i.e., maximum compression), the resulting file is 268KB. The .gz
18%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
-r--r-- 1 root root 556 Nov 10 10:07 s3ql_metadata 08 4 drwxr-xr-x 3 root root 4096 Nov 10 10:07 . Now, I'm ready to mount the filesystem using the mount.s3ql command at /mnt/s3ql (Listing 3 ... advantages: S3QL. ... S3QL filesystem for cloud backups
18%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
, and alerts are then sent by MQTT and stored in a SQLite database. The front end is a lightweight Flask app [3]. Figure 2: The honeyBot project flowchart
18%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
-11-07 drwxr-xr-x. 2 root root 12288 Nov 8 23:07 2014-11-08 lrwxrwxrwx. 1 root root 22 Oct 19 21:22 current -> /var/opt/bro/spool/bro The spool subdirectory not only contains the working directory
18%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
, 50GB of memory, and a 1Gb NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT. In contrast to RHEV 2.2, RHEV 3 is no longer based on RHEL ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt 3.1 ... Managing virtual infrastructures with oVirt 3.1
18%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
 compute(istart, iend): 06     isum = 0 07     for i in xrange(istart, iend+1): 08         isum += i**3 + 123456789*i**10 + i*23456789 09  10     return isum 11  12 if '__main__' == __name__: 13  14
18%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
5221548db 58 seconds ago 5.67MB 80dc7d447a48 About a minute ago 167MB alpine 3.9 78a2ce922f86 5 months ago 5.55MB The command you really
18%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
Linux will be a community-based 1:1 binary replacement for Red Hat Enterprise Linux and currently ships with Gnome 3.32, Linux kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, Samba 4.12.3, DNF 4
18%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
curl -I http://www.example1.de should then generate the output from Listing 6. Listing 6 Accessing a Redirected Website HTTP/1.1 200 OK Date: Sat, 28 Nov 2020 08:25:05 GMT Server: Apache
18%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
Press [1], Drupal [2], or Joomla [3], generally they only have to unpack the core on the server and then add other modules. Installing security updates conscientiously and in good time counteracts ubiquitous

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice