Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (323)
  • Article (84)
  • News (12)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 43 Next »

19%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
that parse the data). Listing 2 CPU Plot File 01 ################################### RECORDED ################################### 02 # Collectl: V3.6.1-4 HiRes: 1 Options: -D Subsys: bcdfijmnst
19%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
  30.85  72.31   13.16   20.40   0.26    70.44    83.89   1.97   3.52 nvme0n1         58.80   12.22  17720.47     48.71   230.91     0.01  79.70   0.08    0.42    0.03   0.00   301.34     3
19%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
45 46 47 48 49 50 51 52
19%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
19%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
Load 30 check_command check_nrpe!check_load!5.0!4.0!3.0!10.0!6.0!4.0 31 } 32 define service{ 33 use generic-service ; Name of service
19%
What Is an Inode?
23.03.2022
Home »  HPC  »  Articles  » 
 13  2020 iozone3_490 31888630 -rw-rw-r--.  1 laytonjb laytonjb  4136960 Dec  9  2020 iozone3_490.tar 31984747 drwxrwxr-x  21 laytonjb laytonjb     4096 Nov 20  2020 Lmod-8.4.15 31863444 -rw-rw-r--   1
19%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
": executable file not found in $PATH 0a2091b63bc5de710238fadc68ba3f5e0f9af8800ec7f76fd52a84c49a1ab0a7 Listing 3 shows that I do have a working container, so I'll deal with the network namespace error now
19%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
19%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
19%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40MB. Next, open a connection to the debug server by typing target remote :1234 (Figure 3

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice