Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (259)
  • Article (111)
  • News (17)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 39 Next »

18%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
and is usually expressed as eights sets of four hexadecimal digits (known as nibbles, quibbles, or hextets) separated by colons. For example, an IPv6 address looks like this: 2001: 0db8: 1010: 61ab: f005: ba11: 00
18%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
continuously slows down after 3:00pm, suitable extrapolation methods can be used to determine when the shopping cart will no longer respond and allow developers and administrators to take action in good time
18%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
of the application parameters nx = 8000 ny = 8000 t_max = 10000 tolerance = 0.00004D+00 and compiled the code with GFortran on a CentOS 7.8 system. Remora first creates a subdirectory that contains the system
18%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
and supplies (e.g., eBay/PayPal's GO 3 token, known as a "security key"). At the heart of two-factor authentication is the Identikey server, which – in the basic version – comprises a RADIUS interface
18%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
algorithms are round robin and least connected, which are most commonly used in LVS clusters. Configuring the Piranha Infrastructure Piranha [3] is a clustering product from Red Hat that is based on the LVS ... 3
18%
Terraform multicloud orchestrator version 1.0
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Annie Spratt on Unsplash
. These state files can be stored either locally or in a remote store (e.g., on Amazon's S3). The remote option has the advantage that Terraform can fetch the target state from the network at any time, which
18%
Integrating scripts into Group Policy
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © abidal, 123rf.com
is hidden. 3. Logoff scripts in the user's Group Policy are executed when a user logs off. 4. User-independent scripts in Group Policy are executed at boot time in the background before a user logs
18%
Data deduplication on Windows Server 2022
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © iofoto, Fotolia.com
the configuration of the deduplication parameters, such as the schedule for garbage collection and optimization: Set-DedupSchedule -Name "DailyOptimization" -Type Optimization -Start 01:00 -DurationHours 3 You can
18%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
. Amdahl’s Law says the speedup is 1.00 (i.e., the starting point). Notice that as the number of processors increases, the wall clock time of the parallel portion decreases. The speedup a increases from 1.00
18%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
168 (gdb) p j $3 = 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $6 = (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice