Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 09 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (489)
  • Article (136)
  • News (9)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 64 Next »

13%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
containers (Figure 3) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
13%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
can save some partitions or devices for later when the requests for more space arrive. You can also create PVs and just leave them for later. Listing 1 is an example from an Ubuntu 22.04 system
13%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
13%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
13%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
168 (gdb) p j $3 = 144 (gdb) c Breakpoint 2, Calc_vacf () at MD.o.c:671 671 vacf[j-i]=0; (gdb) p &j $6 = (int *) 0xffffc168 (gdb) p j $7 = 144 On the other hand, when dealing with the ELF
13%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
never predict more than half of the failed drives." Temperature effects are interesting, in that high temperatures start affecting older drives (3-4 years old or older), but lower temperatures can also
13%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Management Console [3] Lambda service page with an orange Create function button. Figure 1: The page where you will create a Lambda function. If you
13%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
systems, distinguishes between virtual memory, which the operating system and applications see, and physical memory, which is provided by the hardware of the machine, the virtualizer, or both [2] [3]. Both
13%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
13%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
not have enough performance to make it interesting to me. Figure 1: My early Cluster HAT. Starting with the Raspberry Pi 3, the CPU was now 64 bits

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice