Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (124)
  • News (35)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 54 Next »

30%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
step to complete this. 3. Copy the SSH private key data to the local system/env, where the SSH client is also installed. 4. Update the config file containing the SSH session server details. The file
30%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
.pl 00:00:00.50023 The output shows the amount of computing time the database engine consumed. You can pass in the desired time as a CGI parameter: $ curl http://localhost/cgi/burn0.pl\?3 00
30%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
/etc/bashrc , or (3) modifying $PATH in your own account. For the purposes of demonstrating how to do this, I will modify my .bashrc file with the following line: export PATH
30%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
30%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
Code Example 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my
30%
HDF5 and Parallel I/O
17.05.2017
Home »  HPC  »  Articles  » 
, ALLOCATABLE, TARGET :: DATA(:,:)   ! Data to write 18      INTEGER :: RANK = 2             ! Dataset rank 19    20      CHARACTER(MPI_MAX_PROCESSOR_NAME) HOSTNAME 21      CHARACTER(LEN=100) :: FILENAME  ! File name 22      CHARACTER(LEN=3) :: C
30%
Shared Storage with NFS and SSHFS
12.09.2018
Home »  HPC  »  Articles  » 
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port 22
30%
Shared Storage with NFS and SSHFS
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Oleksiy Mark, 123RF.com
an alternative that has more security. SSHFS Filesystem in Userspace (FUSE) [3] offer several attractive features. Such filesystems are easy to code because they are in user space (have you tried getting
30%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
", 19 "VERSIONEDCONSULREGISTRATION": "false" 20 }, 21 "retry_join": [ 22 "consul.datacenter-a.internal.myprivatedns.net" 23 ], 24 "server": true 25 } The Amazon
30%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
and Service Manager) are used to deploy an operating system on a node. OSISM [3], the deployment and lifecycle management framework, installs and configures all the required OpenStack components on that node so

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice