Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (584)
  • Article (195)
  • News (14)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 80 Next »

24%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Manipulation The ntopng Edge (nEdge) [2] version of ntopng actively manipulates network traffic. nEdge lets you analyze network traffic at the protocol level (Layer 7) and block or restrict application
24%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
   100   100   010    Pre-fail  Always       -       0   9 Power_On_Hours          0x0032   097   097   000    Old_age   Always       -       12441  12 Power_Cycle_Count       0x0032   098   098   000    Old
24%
System 76 Unleashes World's Smallest Quad-GPU Workstation
20.10.2020
Home »  News  » 
.2 gen 2 Type-A ports, 1 USB 3.2 Type-C, 2 RJ-45 LAN ports, 5 audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0 To accommodate such power, System 76 had to put serious work
24%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
24%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
container, create a directory and mount the root filesystem (run lsblk to verify the host filesystem; in this case, nvme0n1p1): mkdir /mnt/host_root mount /dev/nvme0n1p1 /mnt/host_root Now if you change
24%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99), ('To Kill a Mockingbird', 'Harper Lee', '1960-07-11', 12.99), ('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99); At this point
24%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
is Computer A. This type of attack is known as Man in the Middle attack. This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
24%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
it to become a Best Effort program with the top priority available to it: # ionice -c 2 -n 0 apache2 Back to iotop There’s also some useful interactive commands with iotop.You can move the cursor arrows
24%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
speedup, n is the number of processors, and p is the parallel fraction, or the fraction of the application that is parallelizable (0 to 1). In an absolutely perfect world, the parallelizable fraction
24%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
_On_Hours 0x0032 097 097 000 Old_age Always - 12441 12 Power_Cycle_Count 0x0032 098 098 000 Old_age Always - 1482 177 Wear_Leveling_Count 0x0013 098

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice