Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (202)
  • Article (87)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 Next »

21%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
# replace: olcRootDN 07 dn: olcDatabase={2}bdb,cn=config 08 changetype: modify 09 replace: olcRootPW 10 olcRootPW: {SSHA}f0pv70XFFox5UqKc6A4Uy39NcxkqcJbc 11 - 12 replace: olcAccess 13 olcAccess: {0}to attrs
21%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
nodes, and make sure to do this as a user and not as root. 3. To make life easier, use shared storage between the controller and the compute nodes. 4. Make sure the UIDs and GIDs are consistent
21%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [3]. One remaining
21%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
through the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
21%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
in to the first compute node (Listing 5). Listing 5: Checking Lmod on the Compute Node [laytonjb@warewulf ~]$ ssh n0001 Last login: Sun Feb 12 09:10:32 2023 from 10.0.0.1 [laytonjb@n0001 ~]$ module
21%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
or small businesses can use the package for free, but larger organizations need to purchase a license [3]. The commercial license also includes special features such as the Hardened Docker Desktop, which
21%
OrientDB document and graph database
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Victoria, Fotolia.com
chapter={1,2,3,4,5,6}; Graph databases have base types V (node) and E (edge). Lines 4-8 create the classes Person and Book as an extension of the base node and defines their attributes. The usual
21%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
, on the secondary node, enter: $ watch -n1 cat /proc/drbd You should see something similar to the output shown in Listing 3. When synchronization is 100 percent complete, the same file will showcase the output
21%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
at coding with OpenCL in the next article in this supplement. n Info [1] FAI: [http://fai-project.org/] [2] Partimage: [http://www.partimage.org/Main_Page] [3] SystemImager:  [http
21%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
. First, get the distribution name: $ cat /etc/issue Ubuntu 8.04 \n \l An intruder typically executes some basic commands to get to know the system. Of particular interest are the \etc directory

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice