Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (524)
  • Article (138)
  • News (16)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 68 Next »

14%
Network Grep
26.11.2012
Home »  Articles  » 
 
port 80. Additionally, you can isolate one sender IP address that is sending the port 80 traffic. Notice the src   host syntax: # ngrep port 80 and src host 12.34.56.78 Moving on from a single IP
14%
Nagios Passive Checks
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Lisa Young, 123RF.com
_threshold 1800 11 check_period 24x7 12 check_command check-host-alive 13 } Listing 3 24x7 01 define timeperiod { 02 timeperiod
14%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
is not supported. Moreover, it is imperative for each table to have a primary key. Surprisingly, IPv6 is still lacking – in 2017! Currently, network communication between the replicating nodes relies on IPv4
14%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
 volume "/dev/sdb" successfully created. Then, I verify that the volumes have been appropriately labeled: $ sudo pvs   PV           VG Fmt  Attr PSize    PFree      /dev/nvme0n1    lvm2 ---  <232.89g <232.89g   /dev/sdb        lvm2 ---    <6
14%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
version 5.6. Figure 2: Cluster cabling can get out of hand quickly, so be neat. Once you have the media in-hand, begin by installing the admin node
14%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
 to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start_time)   print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code
14%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
of code. Listing 1 Time to Execute import time start_time = time.time() # Code to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start
14%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
.matrix.dev/gentoo-java:latest-amd64 . && touch buildtime && docker push dockerrepo.matrix.dev/gentoo-java:latest-amd64 && touch pushtime Sending build context to Docker daemon 66.12MB Step 1/6 : FROM dockerrepo
14%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
public key has been saved in eks-ssh.pub. 09 The key fingerprint is: 10 SHA256:Pidrw9+MRSPqU7vvIB7Ed6Al1U1Hts1u7xjVEfiM1uI 11 The key's randomart image is: 12 +---[RSA 4096]----+ 13 | .. ooo+| 14
14%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
_ADDR='http://127.0.0.1:8200' The unseal key and root token are displayed below in case you want to seal/unseal the Vault or re-authenticate. Unseal Key: PrAbjZWj2NYYnV6Lh/FRpf5Nu5f2E5fwZZf95JQiLdo= Root Token: s

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice