Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%2n2222a Llorente 22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (61)
  • Article (33)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

16%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
to the top10 variable (Table 1). Table 1 ggplot2 Histogram Elements ggplot2 Code Action data=top10, aes(x=x, y=freq, fill=x) Set the x axis with the top 10 IP addresses
16%
HPC fundamentals
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Kasia biel, 123RF.com
seconds set connect timeout (default is 10 sec) -u seconds set command timeout (no default) -f n use fanout of n nodes -w host,host,... set target node list on command line -x
16%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
 seconds        set connect timeout (default is 10 sec) -u seconds        set command timeout (no default) -f n              use fanout of n nodes -w host,host,...  set target node list on command line -x
16%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
.10e-10 *** monthJuly 211.030 20.849 10.122 < 2e-16 *** monthJune 167.145 22.755 7.345 5.85e-13 *** monthMay 24.528 21.411 1.146 0.2524 monthMarch -10
16%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
getsockopt ... 17 Resolving symbol close ... 18 Resolving symbol epoll_wait ... 19 Resolving symbol select ... 20 All dynamic symbols could be resolved. 21 socket(2, 1, 6) = 3 22 Socket 3 will be Knockified
16%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
remains to finish (20% in this case). When the test is done, the output looks like this: [root@home4 ~]# smartctl -l selftest /dev/sdd smartctl 5.43 2012-06-30 r3573 [x86_64-linux-2.6.32-358.18.1.el6.x86
15%
Rethinking RAID (on Linux)
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © nikkikii, 123RF.com
that your boot-loader understands md/v1.x metadata, or use --metadata=0.90 mdadm: /dev/sdc1 appears to be part of a raid array: level=raid1 devices=2 ctime=Sat Jan 9 15:22:29 2021 Continue
15%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
.Exit(1) 15 } 16 17 run(os.Args[1]) 18 } 19 20 func row() { 21 for i := 0; i < size; i++ { 22 for j := 0; j < size; j++ { 23 array[i][j]++ 24 } 25 } 26 } 27 28
15%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
, a server, MongoDB, and Elasticsearch. Installation Prerequisites for the installation of Graylog 2.4 – in this example, under CentOS 7 – are Java version 1.8 or higher, Elasticsearch 5.x [2
15%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
): ssh-keygen -t ed25519 -a 100 -f ubuntu-sre-id_ed25519 -q -N 2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice