Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1001)
  • Article (301)
  • News (181)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 149 Next »

17%
ratarmount Archive Mount Tool
07.09.2025
Home »  Articles  » 
.gz took 0.05s Writing out TAR index to /home/laytonjb/DATA_STORE/data1_08022025.tar.gz.index.sqlite took 0s and is sized 245760 B Building cache for union mount (timeout after 60s)... Cached mount sources
17%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
store? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy
17%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy is the hostname
17%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
is Computer A. This type of attack is known as Man in the Middle attack. This article covers a number of tools used in arp cache poisoning attacks, including ettercap, arpspoof, nemesis, p0f, dsniff, and scapy
17%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
bo in cs us sy id wa 0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5 In this case, it’s the io section you’re interested in. Input/Output is seemingly defined
17%
Listing 1
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
/primary_db                                                                                                       | 419 kB     00:00 epel                                                                                                                    | 4.0 kB     00:00 epel
17%
Baselines are more important than  the  benchmark
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Lucy Baldwin, 123RF.com
brd rd_nr=1 rd_size=524288 # ls /dev/ram0 /dev/ram0 You can use this approach to evaluate the performance effect of encrypted partitions without having to worry about the noise of the underlying
17%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were: HTPassw0rd Passw0rd!81 Passw0rd Passw0rd! Pas$w0rd Rite1
17%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
shows an example of how Linux outputs this information for x86 architectures. Listing 1: Linux Topology $ cat /proc/cpuinfo [...] processor  : 3 [...] physical id  : 0 siblings  : 4 core id    : 3 cpu
17%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice