Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kids Man high line mind(711bmw.com)kids Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
  • Article (40)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

18%
User File Recovery
19.04.2018
Home »  HPC  »  Articles  » 
and publicized. To my mind, this pointed to one possible solution to the problem – developing policies in conjunction with management while addressing the resource implications. To begin the development
18%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
way. To my mind, the "Customizing PortSentry" article  [1] complements the topic of this article very nicely and might help you build a super-simple but highly effective security solution if you
18%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
is in $PATH and where it is located. For example, look for perl (Figure 3). Notice that the output tells you where the man pages are located, as well as the binary
18%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
. Something along the lines of: TID PRIO USER DISK READ DISK WRITE IO> COMMAND 18981 be/4 www-data 0.00 B/s 3.92 K/s apache2 -k start Or, if you were trying to see which system user
18%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
It has a number of modes of encryption that provide additional capability beyond just a straight block cipher. You can read about that at an on-line MCrypt man page. Using mcrypt is very similar
18%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
seconds). If the check program is still running after this time, it is forcibly terminated and its execution is considered to have failed. Lines 3 and 4 are checking for the exit status of the command
18%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
\n\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging
18%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
, C++, and Python. Ganglia has also gained a new web interface with custom graphs. At a high level, Ganglia comprises three parts: The first part is gmond , which is the part of Ganglia that gathers
18%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
line has just a few columns of output (the man pages for iostat were used for the list below): %user: The percentage of CPU utilization that occurred while executing at the user level (this
18%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
also churn up Amazon services through a command-line interface or trigger them programmatically using the provided APIs. This article describes how to implement a web server with a high-availability back

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice