Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (413)
  • Article (124)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Next »

61%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
orchestrated DDoS attacks. In the DDoS attacks on US financial institutions last year, the offenders achieved 20 times the effect of ordinary desktop botnets with a handful of servers. This trend exacerbated
61%
RADOS and Ceph: Part 2
22.10.2012
Home »  HPC  »  Articles  » 
must ensure that its contents are available redundantly within the whole cluster. Not the least of developers’ problems is dealing with “rack awareness.” If you have a 20-node cluster with RADOS in your
61%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
by the kdump startup script, but only if a protected memory area is also present. To let the original kernel know this, you need to specify the boot loader option crashkernel=XM[ @YM] , where X is the size
61%
Rex
19.02.2013
Home »  Articles  » 
on the administrator’s own machine, which even can be a Windows or Mac OS X machine; the only important thing is that you have a Perl environment in place. To install Rex, first pick up the git versioning tool (using
61%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
, therefore, decide in advance whether they want to work with certificates, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509
61%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
, and PGP key servers. The sources supported are Google, Google profiles, Bing, PGP, LinkedIn, and Exalead. New features were added as of March 4, 2011, with the version 2.0 release, including time delays
61%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
but fell at the last hurdle for one reason or another. Then I remembered my mighty friend htaccess. Spending about US$ 20 a year to register a really short domain name on one of the briefest top
61%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
Files are 10x bigger than in previous studies Files are rarely reopened: >66 percent are reopened just once and 95 percent are opened fewer than five times <1 percent of clients account for 50
61%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
to maintain program correctness. Listing 1 is an example of the ways you can define a coarray. Listing 1: Defining Coarrays integer :: x[*]   ! scalar coarray   real
61%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
be turned on and off according to what you want to check about the state of the node. Almost 20 years ago, when I worked for a Linux high-performance computing (HPC) company that no longer exists, We had

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice