Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (580)
  • Article (194)
  • News (14)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 79 Next »

24%
System 76 Unleashes World's Smallest Quad-GPU Workstation
20.10.2020
Home »  News  » 
.2 gen 2 Type-A ports, 1 USB 3.2 Type-C, 2 RJ-45 LAN ports, 5 audio jacks, built-in Intel® Wireless-AC (a/b/g/n/ac/ax), and Bluetooth 5.0 To accommodate such power, System 76 had to put serious work
24%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
"SubnetMax": "10.99.0.0", 07 "Backend": { 08 "Type": "udp", 09 "Port": 7890 10 } 11 } 12 [...] At first glance, this concept looks robust and simple
24%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
container, create a directory and mount the root filesystem (run lsblk to verify the host filesystem; in this case, nvme0n1p1): mkdir /mnt/host_root mount /dev/nvme0n1p1 /mnt/host_root Now if you change
24%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
Catcher in the Rye', 'J.D. Salinger', '1951-07-16', 15.99), ('To Kill a Mockingbird', 'Harper Lee', '1960-07-11', 12.99), ('Pride and Prejudice', 'Jane Austen', '1813-01-28', 9.99); At this point
24%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
is Computer A. This type of attack is known as Man in the Middle attack. This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
24%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
it to become a Best Effort program with the top priority available to it: # ionice -c 2 -n 0 apache2 Back to iotop There’s also some useful interactive commands with iotop.You can move the cursor arrows
24%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
speedup, n is the number of processors, and p is the parallel fraction, or the fraction of the application that is parallelizable (0 to 1). In an absolutely perfect world, the parallelizable fraction
24%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
_On_Hours 0x0032 097 097 000 Old_age Always - 12441 12 Power_Cycle_Count 0x0032 098 098 000 Old_age Always - 1482 177 Wear_Leveling_Count 0x0013 098
24%
Verifying your configuration
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kritiya Sumpun, 123RF.com
="dcgoss test driver docker image" ENV DCPS_VERSION 2.12.2 ENV GOSS_VERSION 0.3.20 SHELL ["/bin/ash", "-o", "pipefail", "-c"] WORKDIR /tmp RUN apk add --no-cache --virtual=goss-deps ca-certificates curl && apk
24%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
Listing 12 Debug Output Snippet consul-template -once -template "httpd.conf1.ctmpl:out" -log-level=debug 2018/07/10 01:03:09.580356 [INFO] consul-template v0.19.5 (57b6c71) 2018/07/10 01

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice