Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1174)
  • Article (301)
  • News (173)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 166 Next »

29%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
it to become a Best Effort program with the top priority available to it: # ionice -c 2 -n 0 apache2 Back to iotop There’s also some useful interactive commands with iotop.You can move the cursor arrows
29%
Listing 1
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
                                                                                                         |  951 B     00:00 Setting up Install Process Resolving Dependencies --> Running transaction check ---> Package gkrellm-daemon.x86_64 0:2.3.5-3.el6 will be installed --> Processing Dependency: libsensors
29%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
. For example, to run a report every three seconds for five iterations on eth0, you would use the command in Listing 4. Listing 4 capstats /opt/bro/bin/capstats -I 3 -n 5 -i eth0 1415510235
29%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
rd_size=524288 root@focal:~# ls /dev/ram0 /dev/ram0 root@focal:~# fallocate -l 2M header.img root@focal:~# echo -n "not a secure passphrase" | cryptsetup luksFormat -q /dev/ram0 --header header
29%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were: HTPassw0rd Passw0rd!81 Passw0rd Passw0rd! Pas$w0rd Rite1
29%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
filters to your child class, three IP Addresses can share 100Mbit in this case 04 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 1.2.3.4 flowid 1:14 05 tc filter add dev $DEV
29%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
, Postscript, PDF, PNG, SVG, and XML formats. Listing 2, for example, shows the plain text output for a two-socket, eight-core server. Listing 2: lstopo Textual Output. 01 Machine (24GB) 02   NUMANode P#0 (12
29%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
29%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
2 3 4 5 6 7 8 0 0 0 0 1 1 1 1 2 1 0 0 0 0 0 0
29%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
 2 min,  0 users,  load average: 0.10, 0.10, 0.04 $ more /tmp/hosts 192.168.1.4 192.168.1.250 This command tells pdsh to take the hostnames from the file listed after -w ^ (no space between

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice