Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (200)
  • Article (87)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 Next »

21%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [3]. One remaining
21%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
through the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
21%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
in to the first compute node (Listing 5). Listing 5: Checking Lmod on the Compute Node [laytonjb@warewulf ~]$ ssh n0001 Last login: Sun Feb 12 09:10:32 2023 from 10.0.0.1 [laytonjb@n0001 ~]$ module
21%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
or small businesses can use the package for free, but larger organizations need to purchase a license [3]. The commercial license also includes special features such as the Hardened Docker Desktop, which
21%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
chapter={1,2,3,4,5,6}; Graph databases have base types V (node) and E (edge). Lines 4-8 create the classes Person and Book as an extension of the base node and defines their attributes. The usual
21%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
, on the secondary node, enter: $ watch -n1 cat /proc/drbd You should see something similar to the output shown in Listing 3. When synchronization is 100 percent complete, the same file will showcase the output
21%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
at coding with OpenCL in the next article in this supplement. n Info [1] FAI: [http://fai-project.org/] [2] Partimage: [http://www.partimage.org/Main_Page] [3] SystemImager:  [http
21%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory
21%
Free Enterprise Backup with Bareos
12.11.2013
Home »  Articles  » 
community to continue development of an independent fork named Bareos. The first stable release was Bareos 12.4 in April 2013 (the version number stands for the year and the quarter of the feature freeze
21%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16 ... 3

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice