Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (40)
  • Article (8)
  • News (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

13%
VDI Basics
03.09.2013
Home »  Articles  » 
 
-negligible drawbacks, and other alternatives can provide almost the same benefits. When discussing the pros and cons, the terminology can get a little confusing; thus, it’s worthwhile to distinguish carefully what
13%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
responding to probes on those open ports, PortSentry actually opens those unused ports and almost becomes a Honeypot – which has its pros and cons. PortSentry has a handful of config files, most of which live
13%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
29 SlurmctldTimeout=300 30 SlurmdTimeout=300 31 InactiveLimit=0 32 MinJobAge=300 33 KillWait=30 34 Waittime=0 35 # 36 # SCHEDULING 37 SchedulerType=sched/backfill 38 SelectType=select/cons_res 39
13%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
Timeout=300 31 InactiveLimit=0 32 MinJobAge=300 33 KillWait=30 34 Waittime=0 35 # 36 # SCHEDULING 37 SchedulerType=sched/backfill 38 SelectType=select/cons_res 39 SelectType
13%
Monitoring containers
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © kangshutters, 123RF.com
[12], for example, relies on cAdvisor and InfluxDB. Visualization then relies on either Grafana or Kubernetes' own Kubedash [13]. Dockerana [14], which took first place at the DockerCon 2014 Hackathon
13%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, or a traditional PC, notebook, mobile phone, or tablet. A third threat is social engineering. The con man has been around for thousands of years in one form or another, but the majority of successful attacks start
13%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
://secureportal.citrix.com/MyCitrix/login/EvalLand.aspx?downloadid=1857216&LandingFrom=1005 Getting started: http://support.citrix.com/proddocs/topic/netscaler-10/ns-gen-nsvpx-wrapper-con-10.html App
13%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
\Local\Microsoft\Windows\TemporaryInternetFiles\Low\Con-tent.IE5\index.dat and listed (Figure 4). Figure 4: Excerpt from the history evaluation (Autopsy
13%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
and cons. A short list includes: dsh PyDSH ppss PSSH pdsh PuSSH sshpt mqsh A number of these tools are written in Python, which has become a very popular tool for devops
13%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
HPC systems typically have some sort of shared filesystem (e.g., NFS, Lustre, BeeGFS), each with pros and cons. One solution often overlooked is sshfs , which belongs to a class of filesystems

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice