Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12%390 Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (224)
  • Article (82)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
; only your explicitly allowed IP addresses present in /etc/hosts.allow can get that far. Another useful precaution is to kick people off the server who have been idle for 20 minutes (i.e., 1,200 seconds
17%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
17%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
in turn stores as a separate time series. The software can already cope with millions of time series, yet version 2.0 [6] should cover more extreme Kubernetes environments with thousands of nodes
17%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
to measure the 15-minute node load average every few seconds? If the application takes 12 hours to run, do you need to measure the CPU load every two to three seconds? The main result of frequent monitoring
17%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
/iptables -X -t nat 12 /sbin/iptables -X -t mangle 13 /sbin/iptables --flush FORWARD 14 /sbin/iptables --flush INPUT 15 /sbin/iptables --flush OUTPUT 16 17 #exit 18 19 #policies for the chains
17%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
, the Linux host system must provide a 64-bit kernel. To determine this, run the uname -m command, and it should output a value of x86_64 or amd64. You can run virtual machines with 32-bit operating system
17%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
-enabled clients, such as the Lightning Thunderbird extension, Evolution, OS  X applications like Apple's iCal (Calendar since Mountain Lion), as well as iOS and Android systems. For this to work, the Kolab team ... data available on iOS and Mac OS  X and in Thunderbird and Evolution.
17%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
--nameserver=10.42.0.10,10.42.0.11 12 # Root password 13 rootpw --iscrypted 14 # Run the Setup Agent on first boot 15 firstboot --enable 16 # Do not configure the X Window System 17 skipx 18 # System
17%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © jeka81, 123RF.com
: $ curl http://169.254.169.254 1.0 2007-01-19 2007-03-01 2007-08-29 2007-10-10 2007-12-15 2008-02-01 2008-09-01 2009-04-04 The cloud-init package installed on an instance contains utilities for its early
17%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
databases in the market [11] is strong. Also, specialized container implementations like Shifter [12] or Singularity [13] are not covered in this article, because they play a subordinate role in the context

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice