Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (540)
  • Article (182)
  • News (124)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 85 Next »

17%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
[::]:* LISTEN As you can see, only port 22 for SSH is open for incoming connections for both IPv4 and IPv6. If you are not (yet) using IPv6 on your network, you should disable it, because what good
17%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
. The following example assumes a system with Ubuntu 22.04. To begin, you need to install some required software management packages (Listing 1, line 1); download the GPG key used to sign Docker's package lists
17%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
monitoring data, then you will be limited in how many metrics, how frequently, and how many nodes can push data to the collection node. A shared GigE (1,000Mbps) network used for application communications
17%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
, network latency, and on and on. I could spend 1,000 pages discussing the problems that influence page load time and never address the bigger picture I endeavor to tackle in this article. Herein, I focus
17%
TinyDNS
02.03.2012
Home »  Articles  » 
 
, and because of its diminutive code base, exceptionally secure. How secure? You might well ask Well, how does a US$ 1,000 reward sound if you discover a security hole? You have to admit that such an offer
17%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
. (From AV-TEST Institute [1], which registered more than 55,000 malicious programs every day.) Although regular updates of signature databases used in virus scanners and intrusion detection systems
17%
Routing with Quagga
19.02.2013
Home »  Articles  » 
to the networks of all other autonomous systems. Thus, the routing tables are correspondingly large (some 400,000 entries in April 2012.) In contrast to OSPF, admins must configure the connection between two
17%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
important because it determines packet fragments on the network. If your chunk size is 8KB and the MTU is 1500 , it will take six Ethernet frames to transmit the 8KB. If you increase the MTU to 9000 (9,000
17%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
 PROGRAM PTR_TEST2 In this example, the pointer PTR2 points to a single real value, and the pointer PTRA points to a block of dynamic memory for 1,000 real values. After you’re done using the block of memory, you
17%
OpenMP – Parallelizing Loops
03.04.2019
Home »  HPC  »  Articles  » 
code by writing parallel code as much as possible. Why run 100,000+ serial jobs on an Exascale machine? You can accomplish this with cloud computing. OpenMP is one of the programming technologies

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice