Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (206)
  • Article (60)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 Next »

61%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
. This translates to Google experiencing about 25,000–75,000 correctable errors (CE) per billion device hours per megabit, which translates to 2,000–6,000 CE/GB-yr (or about 250–750 CE/Gb-yr). This is much higher
61%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
.6.32-220.4.1.el6.x86_64 kernel GigaByte MAA78GM-US2H motherboard AMD Phenom II X4 920 CPU (four cores) 8GB of memory (DDR2-800) The OS and boot drive are on an IBM DTLA-307020 (20GB drive at Ultra ATA
61%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
version from the 8.x branch, but the work shown here can be done with RHEL, as well. Installing Basic Services As the first step, you need to install CentOS 8 and set it up to suit your requirements
61%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
 packetstormsecurity.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX
61%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
be turned on and off according to what you want to check about the state of the node. Almost 20 years ago, when I worked for a Linux high-performance computing (HPC) company that no longer exists, We had
61%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
61%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
connecting several IPsec alternatives to see which versions worked best (and worst) together. My tests included the following: Kame/Racoon on Mac OS X and Linux Solaris 10 Windows Server 2008
61%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
the script, make it executable, and run it, enter: curl https://raw.githubusercontent.com/ hanscees/dockerscripts/master/scripts/get-docker-hub--image-tags.sh > get-public-image-tags.sh chmod +x get
61%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
20.04 system. I had to install some packages for the postprocessing (darshan-util ) tools to work: texlive-latex-extralibpod-latex-perl Different distributions may require different packages. If you
61%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
up a software project. The process differs from one operating system to the next, but this article describes its use on Fedora 25, which first needs a couple of packages from the unofficial repository

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice