Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (119)
  • Article (52)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

33%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
and 256MB of RAM, so the suggested machine type, m1.small is sufficient (Figure 9). You can keep the defaults for the other settings. Continue by pressing Next: Select security
33%
Working with the Lustre Filesystem
24.02.2022
Home »  HPC  »  Articles  » 
, the RPMs shown in Listing 2 will be listed in the root of the source directory. Listing 2: RPMs After the Build $ ls *.rpm kmod-lustre-client-2.14.56_111_gf8747a8-1.el8.x86_64.rpm kmod
33%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
gentoo-bind 636634f1308a: Layer already exists latest-amd64: digest: sha256:667609580127bd14d287204eaa00f4844d9a5fd2847118a6025e386969fc88d5 size: 1996 cd gentoo-java; docker build -t dockerrepo
33%
Lustre HPC distributed filesystem
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Efe Kurnaz on Unsplash
shown in Listing 2 will be listed in the source directory's root. Listing 2 RPMs After the Server Build $ ls *.rpm kmod-lustre-client-2.14.56_111_gf8747a8-1.el8.x86_64.rpm kmod
33%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
33%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
key RSA EIGamal DSA Cipher IDEA 3DES CAST5 Blowfish AES-128/-192/-256 Twofish Camellia-128/-192/-256 Hash MD5
33%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
. Figure 5: Terminal after creating a new tmux window. To cycle through windows, press Ctrl+B-n (next), Ctrl+B-p (previous), or Ctrl+B-x  (where x =0-9) to go to a specific window. If you type Ctrl
33%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
). If you were to do a simple assignment operation (e.g., b = a ) and then assign the data type, you would change the data type of variable a . Listing 1: Change Type Cast import numpy as np N=100
33%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
). Listing 5: /etc/inet/ike/secret/ike.preshared 01 { 02 localidtype IP 03 localid 192.168.1.105 04 remoteidtype IP 05 remoteid 192.168.1.7 06 key f04e8e75162390ba9da8000cb24e8a93fb77af519ce
33%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
is working, boot the compute node and run timedatectl : $ ssh n0001 [laytonjb@n0001 ~]$ timedatectl                Local time: Sat 2022-12-17 11:31:26 EST            Universal time: Sat 2022-12

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice