Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3%A9n Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (258)
  • Article (104)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 38 Next »

18%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
of 12. Figure 5: For 100Mb lines between all ports, the value of 19 applies to all route costs, except for the bundled cables between Switches 3 and 4
18%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
for the gaming industry, such as Kognitio [3], are based on Hadoop. Game chips, customer loyalty cards, and even liquor bottles in bars like Aria Hotel and Casino are equipped with RFID tags. This technology
18%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Dec 9 09:11 microsoft.gpg which means only the root user can read and write to the file. The next step sets up the correct Apt package repository entry, which is ideal for security updates, new
18%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... of the drives (more on that later). Smartmontools is compatible with all S.M.A.R.T. features and supports ATA/ATAPI/SATA-3 to -8 disks and SCSI disks and tape devices. It also supports the major Linux RAID cards ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A ... S.M.A.R.T., Smartmontools, and Drive Monitoring
18%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
very useful metadata. In the Linux kernel, names can be a maximum of 255 bytes and the value can be up to 65,536 bytes (64KiB). XFS and ReiserFS allow these limits; however, ext3/4 and Btrfs impose
18%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
3 04 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 05 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 06 | Source Port
18%
Mounting Compressed Archives as a User
25.01.2022
Home »  HPC  »  Articles  » 
to get into the Linux kernel. A couple of my earlier articles that mention FUSE address data encryption and working with S3QL object storage. As evident by these applications, FUSE can be very useful
18%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
.e., in this example). If the MySQL version you are using is version 5.5.3 or newer, then replace utf8 with utf8mb4: DATABASE_ENCODING=utf8mb4 The results should look like Figure 1. At the bottom
18%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
] device to store /var/log, offloading the primary source of boot-time writes from the physical device to a 50MB RAM drive. Figure 3: Three zram partitions
18%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... recipient versus people who get access that information and try to break the encryption (decrypt it). There are literally hundreds of books on the subject (a quick Amazon search turned up 3,998 results ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice