Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (447)
  • Article (109)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 57 Next »

18%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
18%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node. Getting applications running POD HPC clouds can be quite
18%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
:15:01        all      2.08      0.00      0.96      0.02      0.00     96.94 12:25:01        all      1.96      0.00      0.82      0.06      0.00     97.16 12:35:01 PM     all      1.22      0
18%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
all 1.22 0.00 0.73 0.00 0.00 98.05 12:45:01 PM all 1.32 0.00 0.72 0.01 0.00 97.95 12:55:01 PM all 1.79 0.00 0.75 0
18%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
/apps/apps/conda/pkgs [sudo] password for laytonjb: [laytonjb@warewulf ~]$ ls -lstar /opt/apps/apps total 12 4 drwxrwxrwx 5 root root 4096 Mar 12 11:15 .. 4 drwxrwxrwx 3 root root 4096 Mar 12 11:15 . 4 drwxrwxrwx 4 root root
18%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
  30.85  72.31   13.16   20.40   0.26    70.44    83.89   1.97   3.52 nvme0n1         58.80   12.22  17720.47     48.71   230.91     0.01  79.70   0.08    0.42    0.03   0
18%
Automate Active Directory management with the Python PyAD library
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Eric Issele, 123RF.com
in the following, but watch out: As part of the initial execution, Pip offers to update from version 22.3.1 to 23.1.2 (Figure 1). Do not agree to this request under any circumstances if you want to use PyAD, because
18%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Formation and Terraform in this article as points of comparison, the list of other tools that can provision infrastructure is long: Troposphere [12], Sceptre [13], Bash scripts, custom apps leveraging SDKs, Ansible [14
18%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
: In LR-DIMMs, all of the signal lines (including the data) run through an intermediate chip; this reduces the electrical load on the memory controller. LR-DIMMs have an Isolation Memory Buffer (iMB
18%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice