Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • Article (89)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 30 Next »

30%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
: Z1F35P0G LU WWN Device Id: 5 000c50 050b954c3 Firmware Version: CC27 User Capacity: 3,000,592,982,016 bytes [3.00 TB] Sector Sizes: 512 bytes logical, 4096 bytes physical Device is: In smartctl
30%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
-persistent-net-generator.rules openSUSE, Red Hat 6 * /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
30%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own
30%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
30%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
exiting the data region, the data from the accelerator is copied back to the host. Table 3 shows a simple example of using the copy  clause. Table 3: The copy  Clause Fortran C !$acc
30%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
to S3 will be successful (Listing 6). Listing 6 Backup ActionSet cat <3backup
29%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
 director ... Terminated Jobs:  JobId Level Files Bytes Status Finished Name =====================================================  1 Full 135 6.679 M OK 18-Jul-13 16:00 BackupClient1  2 Incr  0  0       OK
29%
Harden services with systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
-analyze security, it appears with a high score of 9.6 as UNSAFE and a shocked emoji (Figure 3). Figure 3: Starting point: The new service is completely insecure
29%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
/loadavg/ [3]: 1.00 0.97 0.94 1/1279 7743 The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
29%
News for Admins
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
 
Care support for CentOS 6 is $4.25 per instance per month, so you should expect the cost for supporting CentOS 8 to be about the same. CentOS Replacement, AlmaLinux, Available on Azure AlmaLinux hit the ground

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice