Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (64)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

73%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
Commands = -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize These options allow me to monitor CPU, disk, and network in brief mode and slab, processes, and disk in detailed mode. I also added the ability
72%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
source queuing analysis tool, which I co-maintain with Peter Harding [3]. Why Queues? Buffers and stacks are ubiquitous forms of storage in computer systems and communication networks. A buffer is a type
72%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
1 split.sh 01 #! /bin/sh 02 for i in `ls -1 archive/cur` 03 do 04 # Define name component for the individual mail directory 05 pref=`date +%Y-%m-%d-%H-%M-%S` 06 07 # Push mail ... 8
71%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Kurt Seifried: Who are you? I mean this is in the sense that you seem to have come out of nowhere and started submitting a lot of good Linux Kernel security bugs. Dan Rosenberg: I'm currently ... 3
71%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
_traffic_analyzer:port = 3490 Figure 3: SUSE users can set the required Samba variables in YaST. In this case, you would launch the SMBTAD daemon as follows: smbtad -i 3490 ... 3
71%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
selection unchecked because I'm not concerned whether this system remains idle for any length of time. You might want to know whether a system is generally idle so that you can redeploy, add workload ... 8
71%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
% /dev/shm /dev/sda1 485M 35M 425M 8% /boot /dev/mapper/VolGroup-lv_home 235G 188M 222G 1% /home The command raider -R5 sda sdb sdc sdd starts
70%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
://rubyforge.org/frs/download.php/69365/rubygems-1.3.6.tgz tar zxf rubygems-1.3.6.tgz cd rubygems-1.3.6 sudo ruby setup.rb If the last command installs the Gems executable as /usr/bin/gem1.8 (as is the case with Debian and Ubuntu
70%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that's 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
70%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
in your certificate. I did both tasks with OPNsense [10], the software running on my router, because I'm using this CA for other hosts in my internal network, too. Alternatively, Caddy can generate a CA

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice