Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1189)
  • Article (302)
  • News (182)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 168 Next »

16%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were: HTPassw0rd Passw0rd!81 Passw0rd Passw0rd! Pas$w0rd Rite1
16%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
these servers send more information out to the Internet than they receive (like a typical web server). I'm going to assume that, in this case, the Internet-facing network interface is eth0. In other words, when
16%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
shows an example of how Linux outputs this information for x86 architectures. Listing 1: Linux Topology $ cat /proc/cpuinfo [...] processor  : 3 [...] physical id  : 0 siblings  : 4 core id    : 3 cpu
16%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
16%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0. Multivendor VLANs
16%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
read the hosts from a file other than the WCOLL environment variable: $ pdsh -w ^/tmp/hosts uptime 192.168.1.4:  15:51:39 up  8:35, 12 users,  load average: 0.64, 0.38, 0.20 192.168.1.250:  15:47:53 up
16%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
sprzblog mysql ↩ limesurvey -uroot -ppassword > ↩ backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non
16%
Maatkit tools for database administrators
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
tiero, 123RF
sprzblog mysql limesurvey -uroot -ppassword > backup.sql will take 21 seconds to complete: real 0m21.626s user 0m0.000s sys 0m0.000s In the case of larger databases on non-replicated servers
16%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
~ $ kubectl get pods --all-namespaces NAMESPACE NAME READY STATUS RESTARTS AGE kube-system metrics-server-6d684c7b5-ssck9 1/1 Running 0
16%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
Viewing Server Topology 01 # numactl --hardware available: 8 nodes (0-7) node 0 cpus: 0 1 2 3 4 5 6 7 8 9 node 0 size: 16373 MB node 0 free: 15837 MB node 1 cpus: 10 11 12 13 14 15 16 17 18 19 node 1

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 168 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice