Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (266)
  • News (33)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 104 Next »

31%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
sprzblog mysql ↩ limesurvey -uroot -ppassword > ↩ backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non
31%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
sprzblog mysql limesurvey -uroot -ppassword > backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non-replicated servers
31%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
_journal_init=0 /dev/vg00/ext4fs To mount the filesystem, create an appropriate mountpoint up front and then run the mount command: mkdir /mnt/ext4fs mount /dev/vg00/ext4fs /mnt/ext4fs If you want to mount
31%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
to adjust a few application parameters in the Fortran program for a longer run time: nx = 8000 ny = 8000 it_max = 10000 tolerance = 0.00004D+00 The code was compiled using GCC 7.1 and run
31%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants. These names relate to K8s distributions, all of which enrich the vanilla
31%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
scanner’s -sL option (nmap -sL ) performs a reverse DNS lookup on every IP address in the scan and queries the DNS server each time an IP address is listed. In addition to these standard DNS tools, a pair ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
31%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
/loadavg/ [3]: 1.00 0.97 0.94 1/1279 7743 The three additional numbers provided by Linux are the number of running processes (one in this case), the total number of processes, and the last process ID (PID
31%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
wrote on Lmod back in 2018, you will see a discussion about the three commands to run: $ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh $ sudo ln -s /usr
31%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
                               3.105ubuntu1                add and remove users and groups ii  ant                                   1.7.0-3                     Java based build tool like make ii  antlr
31%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v0.56, three lines in /etc/ceph/ceph.conf are all it takes), activating CephX will make many ... We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part 3

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 104 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice