Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (266)
  • News (33)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 104 Next »

29%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
Load 30 check_command check_nrpe!check_load!5.0!4.0!3.0!10.0!6.0!4.0 31 } 32 define service{ 33 use generic-service ; Name of service
29%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [0:0] 04
29%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
as the ability to pass roles. With those privileges, the adversary is able to escalate the privileges inside the account, run an EC2 instance, and exfiltrate information stored in a Simple Storage Service (S3
29%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32) 0 conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_3 (Conv2D) (None, 16, 16, 64
29%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0 . The name is useful because it tells the user the library version
29%
ratarmount Archive Mount Tool
07.09.2025
Home »  Articles  » 
for 5 folders up to a depth of 3 in 0.0264s for faster union mount. Created mount point at: /home/laytonjb/DATA_STORE/DATA1 The mounting process gives you some information about what it’s just done
29%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
3: Gang Execution Fortran C !$acc parallel    do i=1,n       ! do something    enddo !$acc end parallel     #pragma acc parallel {    for (int i=0; i
29%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Shift or – as shown here – an Ingress route for accessing the AWX service. This strategy also works with MicroK8s or K3s. You might have to adjust the Ingress definition if routers such as Traefik cannot cope
29%
Red Hat Enterprise Linux 8.3 Available
02.11.2020
Home »  News  » 
 
-native needs, 8.3 includes updated container images for Buildah and Skopeo, as well as Podman 2.0. With the Podman 2.0 release, developers can work with a new REST API, which was designed with two layers: libpod ... Red Hat has released RHEL 8.3, which includes a number of serious improvements for delivering at scale. ... Red Hat Enterprise Linux 8.3 Available
29%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
_get(ospackages=['gcc', 'g++', 'gfortran'])   Stage0 += openmpi(cuda=False, infiniband=False,                   prefix='/usr/local/openmpi', version='3.1.0') The last line in the recipe adds the OpenMP MPI library to the specfile. In this case, it’s

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 104 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice