Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 22!490 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (367)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 52 Next »

9%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
Reduce paradigm [http://discoproject.org] Hadoopy [22] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
9%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
.part.22 12 Generating manifest /tmp/centos.5- 3.x86.img.manifest.xml 13 14 $ euca- register images/centos.5- 3.x86.img.manifest.xml 15 IMAGE emi- c658102B When all three parts have been uploaded
9%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
18 19 Modules pm_buffer 20 MaxSize 102400 # 100 MByte buffer on the hard disk 21 Type disk 22 23 24 25 Modules om_udp 26 Host GraylogServerName 27 Port
9%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
on the storage node; you just need SSH active on your system. Almost all firewalls allow port 22 access, so you don't have to configure anything extra (e.g., NFS or CIFS); you just need one open port
9%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
} 21 } 22 }, 23 { 24 "Effect": "Allow", 25 "Action": [ 26 "iam:PutRolePolicy", 27 "iam:DeleteRolePolicy" 28 ], 29 "Resource": "arn:aws:iam
9%
SmartOS as a virtualization platform
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Paulus NR, 123RF.com
"nics": [ 16 { 17 "nic_tag": "admin", 18 "model": "virtio", 19 "ip": "dhcp", 20 "primary": 1 21 } 22 ] 23 } You can use this option for Windows virtual machines
9%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
-Host "Removing outdated $MigMBox.pst file." -fore yellow 20 } 21 Write-Host "" 22 23 # Create a .pst file for every mailbox found on system. 24 # 25 Write-Host "Exporting mailbox $MigMBox to file $Mig
9%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
psmisc.x86_64 0:22.6-15.el6_0.1 rdate.x86_64 0:1.4-16.el6 rpcbind.x86_64 0:0.2.0-8.el6 sed.x86_64 0:4.2.1-7.el6 setup
9%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception
9%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
The Secure Boot feature, officially known as the UEFI 2.2 specification, requires the use of digital signatures to allow – or prevent – the loading of device drivers and operating systems. This precaution

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice