Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (292)
  • Article (97)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 40 Next »

28%
Automation with Chef
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Pablo Bustos on Unsplash
on the Chef Infra Server, which can already manage around 100,000 nodes as a standalone installation. The previously mentioned cookbooks, like many other tools, follow a standardized structure that varies
28%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
something like Listing 2. Listing 2 Sample Output Starting Nmap 6.47 (http://nmap.org) at 2015-03-12:00:00 CET Nmap scan report for targethost (192.168.1.100) Host is up (0.023s latency). r
28%
System Logging for Data-Based Answers
25.01.2018
Home »  HPC  »  Articles  » 
2,400 lines of stats (one for each core). If you have 100 nodes, in one minute you have gathered 24,000 lines of stats for the cluster. In one day, this is 34,560,000 lines of stats for the 100 nodes
28%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
 MB p s  or Peak IOPS is  x . However, what does “IOPS” really mean and how is it defined? Typically, an IOP is an I/O operation, wherein data is either read or written to the filesystem
28%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
of a snort log. You have the following information: The IP address of the Linux system is 192.168.100.45; an attacker got in using a WU-FTPD vulnerability and deployed a backdoor. What can you find out about
28%
New Monitoring Tools
14.04.2021
Home »  HPC  »  Articles  » 
will see a screen like that shown in Figure 6. Notice that a small window opens just above the process table listing CPU usage, memory usage, the user, and more about that process
28%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
the graphical interface or with text files in JSON format [6] stored in the /etc/cockpit/machines.d/ directory. A configuration file would resemble Listing 1: "address" can be either the IP address or the DNS
28%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
percentiles. To do this, data is divided into 100 distribution areas. The x th percentile is then the value below which x percent of the observations fall. The classical histogram metric divides a range
28%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
; you will see a screen like that shown in Figure 6. Notice that a small window opens just above the process table listing CPU usage, memory usage, the user, and more about that process
28%
Continuous upgrades for Windows 10
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © golffoto, photocase.com
the release Ring 5 50 percent of employees Six months after the release Ring 6 100 percent of employees Seven months after the release Creating

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice