Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb"22%A9n Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (187)
  • Article (76)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 27 Next »

16%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
is enabled on that Apache server), such as this entry: [Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425 I also found a number of WordPress attacks, most commonly
16%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ... . The first configuration file is slurm.conf  (Listing 1). Listing 1: slurm.conf 01 # 02 # Example slurm.conf file. Please run configurator.html 03 # (in doc/html) to build a configuration file customized 04 ... One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
16%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
: XXXXXXXXXXXXXXXXXX 6 Firmware Revision: 2CV102HD 7 Transport: Serial, ATA8-AST, SATA 1.0a, SATA II Extensions, SATA Rev 2.5, SATA Rev 2.6 8 Standards: 9 Used: ATA/ATAPI-7 T13 1532
16%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
.path.isfile( "/opt/openvpn/ca/keys/" + username + ".crt"): 13 # print "Cert for " + username + " exists" 14 a=1 15 else: 16 17 # get user details 18 detailsurl
16%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
mean you need to shut down, migrate, and restart virtual machines. If you want to reduce the tedium of working with virtual machines, you could resort to an Infrastructure-as-a-Service (IaaS) cloud
16%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
in the container? 20 - name: "mysql client exists" 21 path: '/usr/bin/mysql' 22 shouldExist: true 23 24 # Does the MySQL configuration file exist at the right place? 25 - name: "my.cnf exists and has appropriate
16%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
up data all over physical memory [9]. Because RAM is several orders of magnitude slower than the CPU caches, this (usually inadvertent) waltzing all over the memory space needlessly reduces performance
16%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
. Listing 2 sinfo $ sinfo -s PARTITION AVAIL TIMELIMIT NODES(A/I/O/T) NODELIST p100 up infinite 4/9/3/16 node[212-213,215-218,220-229] sbatch To submit a batch serial
16%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open
16%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
. The pwgen command generates a password and encrypts with sh256sum: pwgen -N 1 -s 100 echo -n | sha256sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice