Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (172)
  • News (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 83 Next »

17%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
, it will only capture the first 68 bytes of each packet. Except in older versions of tcpdump, a snaplen value of 0 uses a length necessary to capture whole packets. Figure 1 dissects the output of a sample dump
17%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
-system svclb-traefik-p46m5 2/2 Running 0 11m kube-system coredns-d798c9dd-kjhjv 1/1 Running 0 12m kube-system traefik-6787cddb4b-594
17%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
this PHP test: [Directory Bruteforce] /wp-login.php Additionally, a high number of potentially problematic crawler issues were logged: [Bad Crawler] python-requests/2.22.0 [Bad Crawler] Java/1.8.0
17%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
testing on a test cluster, because the production systems are 100% identical. Partimage [2] is an easy-to-use imaging tool that backs up and restores different types of partitions. SystemImager [3] is far
17%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
at the bottom of the window, ranges from 0 (less risky) to 100 (more risky). Because these two processes started after the malware installed, they are likely bad. When I compared the Start Time of svchost
17%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
" ; shift 20 local display_list="$1" 21 while read display width_mm height_mm width height ; do 22 if [[ "$display" == "$find_display" ]] ; then 23 echo ${width}x${height} 24
17%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
cores. This same HPC center has users asking for 50,000 and 100,000 cores for running their applications. The coin of the realm for these researchers is core count and not per-core performance. Another
17%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
cost to build a chiller plant as part of the data center can be eliminated altogether. This can result in more that $100K of operational savings per megawatt (MW) of IT and eliminate capital expenditures
17%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
="binary" unique="0" required="0"> 18 19 Location of the Asterisk PBX server binary 20 21 Asterisk PBX server binary 22
17%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
a paid license for every system in your HPC cluster, the cost is often prohibitive, and, in many cases, unnecessary. CentOS, which was 100 percent compatible with RHEL, could run on the same systems

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice