Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • Article (136)
  • News (10)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 62 Next »

13%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
13%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
13%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
168 (gdb) p j $3 = 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $6 = (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF
13%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
never predict more than half of the failed drives." Temperature effects are interesting, in that high temperatures start affecting older drives (3-4 years old or older), but lower temperatures can also
13%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Management Console [3] Lambda service page with an orange Create function button. Figure 1: The page where you will create a Lambda function. If you
13%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
systems, distinguishes between virtual memory, which the operating system and applications see, and physical memory, which is provided by the hardware of the machine, the virtualizer, or both [2] [3]. Both
13%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
13%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
not have enough performance to make it interesting to me. Figure 1: My early Cluster HAT. Starting with the Raspberry Pi 3, the CPU was now 64 bits
13%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
of the test, and the user application execution time (which is likely to be unknown). To determine performance, I use the NASA Advanced Supercomputing (NAS) parallel benchmarks [3], a set of code created
13%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 62 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice