Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (350)
  • Article (121)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 48 Next »

21%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
%|# :1009 _handle_fromlist 5| 1| 2.55108e-05| 2.55108e-05| 0.00%|import numpy as np (call)| 1| 0.745732| 0.745732| 0.04%|# :978 _find_and_load 6| 1| 2.57492e-05
21%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
5 enp5s25 ether off unmanaged 6 docker0 ether routable configured 7 virbr0 ether no-carrier unmanaged Remember
21%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
, or Docker flavor and then start a container on the basis of that image. Listing 6 shows how to download a Fedora 22 image and start a new container based on it. Listing 6 Download and Start
21%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
, you can define the following anti-spoofing rules: # Anti-spoofing ip6tables -A INPUT ! -i lo -s ::1/128 -j DROP ip6tables -A INPUT -i $WAN_IF -s FC00::/7 -j DROP ip6tables -A FORWARD -s ::1/128 -j DROP ... We design a basic set of ip6tables rules for an IPv6 firewall. ... ip6tables Rules ... IPv6 Tables ... Creating Firewall Rules with ip6tables
20%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
20%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
20%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
buffered disk reads: 616 MB in 3.00 seconds = 205.03 MB/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292 MB in 2.00 seconds = 3153.09 MB/sec If this were a spinning disk, you would also
20%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
| 444 kB 00:00 (2/2): ntpdate-4.2.4p8-2.el6.x86_64.rpm | 57 kB 00:00
20%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
.519354 pkts=6 kpps=0.0 kbytes=0 mbps=0.0 nic_pkts=16 nic_drops=0 u=2 t=2 i=0 o=0 nonip=2 1415510244.519597 pkts=6 kpps=0.0 kbytes=0 mbps=0.0 nic_pkts=22 nic_drops=0 u=2 t=2 i=0 o=0 nonip=2 1415510247
20%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2 ... 6

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice