Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (200)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 184 Next »

13%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
licensed. NexentaStor [3] distinguishes between the Community Edition and the Enterprise Edition. The Community Edition is free, but not intended for production systems (which the EULA explicitly forbids
13%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
at level 3. To do this, each VLAN must have a connection to a router. VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e
13%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
you request information externally about CPU load, RAM, or disk space usage, you need to install a verbose add-on, such as NRPE [3], on each machine. The remote Icinga server will tell it to execute
13%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
the currently loaded modules in an environment variable called LOADEDMODULES . For example, if I load two modules (ftw and mpich2 ) and then look at my environment, I will find: LOADEDMODULES=fftw/3.3.2/gnu4
13%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
Octave R JavaScript   v3f670da0 v2.7.1 vR2011a v3.4 v2.14.2 v8 3.6.6.11 fib 1.97 31.47 1,336.37 2
13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
13%
Rethinking RAID (on Linux)
16.03.2021
Home »  HPC  »  Articles  » 
=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan  9 15:31:04 2021   write: IOPS=352, BW=1410Ki
13%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
dynamically by Windows depending on the utilization level [3]. WSL is still in its early stages, but Microsoft is actively developing the project and adding additional features, such as GUI support for a fully
13%
ASCII-based monitoring tools
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © tele52, 123RF.com
to reduce the zoom, use the m key to "minimize" (Figure 3). Think of it as zooming in and out in your web browser. If you like, you can zoom in on all the charts with the plus (+ ) key. Likewise, you can
13%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
networks are established on the existing Layer 3 infrastructures. VXLAN technology is all about assigning IP addresses in a larger network array and keeping IP addresses in case of location changes. From

« Previous 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice