Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (961)
  • Article (319)
  • News (104)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 139 Next »

19%
Lustre HPC distributed filesystem
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Efe Kurnaz on Unsplash
,BROADCAST,RUNNING,MULTICAST> mtu 1460 inet 10.0.0.2 netmask 255.255.255.255 broadcast 0.0.0.0 inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20 ether 42:01:0a:80:00:02 txqueuelen 1000
19%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
Virtual local area network (VLAN) tagging on an IEEE 802.3 network is defined by the 802.1Q standard, which makes it possible to separate traffic from different logical networks within a physical ... LAN data transmission has evolved from the original IEEE 802.3 standard to virtual extensible LAN (VXLAN) technology and finally to today's Generic Network Virtualization Encapsulation (GENEVE
19%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
:1071867223(0) win 512 98:15:eb:38:f3:c1 c8:d7:c1:61:be:a3 0.0.0.0.30693 > 0.0.0.0.57646: S 1759104040:1759104040(0) win 512 dc:6d:43:15:be:52 99:19:41:22:4e:36 0.0.0.0.29211 > 0.0.0.0.63665: S 481173385
19%
Parallelizing and memorizing Python programs with Joblib
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
)]: Done 1 out of 181 | elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3
19%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
wrote on Lmod back in 2018, you will see a discussion about the three commands to run: $ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh $ sudo ln -s /usr
19%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
.pool.ntp.org driftfile /var/lib/chrony/drift makestep 1.0 3 rtcsync allow 10.0.0.0/8 local stratum 10 keyfile /etc/chrony.keys leapsectz right/UTC logdir /var/log/chrony I pointed the head node to 2.rocky
19%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
|21|" | cut -d\| -f3` 48 b=`cat $newdat | grep "50|25|" | cut -d\| -f3` 49 50 a=$(echo $a | tr \, \.) 51 b=$(echo $b | tr \, \.) 52 53 54 psum=$(echo "$a+$b" | bc ) 55 echo -n "Invoice amount: $psum, continue
19%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
disk reads: 1306 MB in 3.00 seconds = 434.77 MB/sec federico@cybertron:~$ sudo hdparm -W /dev/sdb /dev/sdb: write-caching = 1 (on) federico@cybertron:~$ sudo hdparm -W 0 /dev/sdb /dev/sdb: write
19%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
), a daily backup runs every day at 3:30am (seven snaphots are kept), and a weekly backup starts at 3:00am every Monday (four snapshots are available). Regularly running backups using cron is equally suitable
19%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
, and there are several implementations [3]. What Happened Thus Far Figure 1 shows a typical setup with port knocking. The components involved here are the client and the server application, with a firewall to keep out

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 139 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice