Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (940)
  • Article (295)
  • News (166)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 141 Next »

16%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
was the sequential write test using 1MB record sizes: ./iozone -i 0 -c -e -w -r 1024k -s 32g -t 2 -+n > iozone_write_1.out To gather the block statistics, I ran ioprof in a different terminal window before I ran
16%
OpenMP – Loops and Data Control
08.05.2019
Home »  HPC  »  Articles  » 
 (i=0; i < n; i++) {    ... }   for (j=0; j < m; j++) {    ... }   for (k=0; k < n*m; k++) {    ... } Listing 2: Parallelized Sets of Loops Fortran C !$omp parallel do do i=1,n
16%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
and a volume using the built-in guidance wizard, which prompts you to select the preferred RAID type. In my case, JBOD, RAID 0, RAID 1, RAID 5, RAID 6, and even a proprietary solution called SHR were available
16%
Monitoring events with the Audit daemon
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © alphaspirit , 123RF.com
_full_action = SUSPEND disk_error_action = SUSPEND tcp_listen_queue = 5 tcp_max_per_addr = 1 ##tcp_client_ports = 1024-65535 tcp_client_max_idle = 0 enable_krb5 = no krb5_principal = auditd You can also spread
16%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
store? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy
16%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
is Computer A. This type of attack is known as Man in the Middle attack. This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
16%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
bo in cs us sy id wa 0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5 In this case, it’s the io section you’re interested in. Input/Output is seemingly defined
16%
Listing 1
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
/primary_db                                                                                                       | 419 kB     00:00 epel                                                                                                                    | 4.0 kB     00:00 epel
16%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
with the start command: [BroControl] > start starting bro ... [BroControl] > Whenever Bro starts up, it starts its daemon to listen to all the traffic defined in its /opt/bro/etc/node.cfg file. This is eth0
16%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
brd rd_nr=1 rd_size=524288 # ls /dev/ram0 /dev/ram0 You can use this approach to evaluate the performance effect of encrypted partitions without having to worry about the noise of the underlying

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 141 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice