Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (414)
  • Article (121)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 54 Next »

12%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
programming languages have functions for computing hash functions. In PHP, the function goes by the name of hash; Listing 1 provides some code to match. Python has the hashlib library functions. A call
12%
KISS – Adding a New User
04.11.2024
Home »  HPC  »  Articles  » 
obvious, but it is the most important: Give details to the new user about their account. I like to send a list of things they need with links to more information, such as: the account name
12%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
about CephX Ceph encryption and how a Ceph cluster could be used as a replacement for classic block storage in virtual environments. Now, it’s time to talk about what to do when things go wrong. Those
12%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
In the past year in ADMIN magazine and ADMIN Online, I have introduced RADOS object store devices (OSDs), monitoring servers (MONs), and metadata servers (MDSs), along with the Ceph filesystem [1
12%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
from the network without interruption. Load Balancing in Layer 4 Seesaw [1] is a load balancing implementation based on the Linux Virtual Server project, which makes it different from HAProxy or NGINX
12%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
systems on the local network to get to the desired data. Malware Analysis Methods To apply reverse engineering, you examine and disassemble the software statically to understand what the code does, which
12%
Centralized software repository management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© 1xpert, 123RF.com
server as you can access the Red Hat Network or software packages hosted by a web server. Pulp [1] doesn't act as a proxy between the clients and the various repositories; instead, it mirrors the packages
12%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
mpi/mpich2/1.5b1 , where 1.5b1 is the name of the module. This allows me to add other versions of the same toolkit while keeping the older toolkits available. The second thing I do is have standard
12%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
distinction that will prevent confusion. In Linux (and *nix computing in general), system load is a measure of work that the system performs. The classic uptime (or w) command lists three load averages for 1
12%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
, 1965;19:297-301, https://www.ams.org/journals/mcom/1965-19-090/S0025-5718-1965-0178586-1/S0025-5718-1965-0178586-1.pdf Prometheus Anomaly Detector: https://github.com

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice