Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kinds Man high line mind(711bmw.com)kinds Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (99)
  • Article (40)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next »

18%
The fine art of allocating memory
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
://lxr.free-electrons.com/source/mm/oom_kill.c?v=2.6.32 mm/oom_kill.c: http://lxr.free-electrons.com/source/mm/oom_kill.c?v=3.2 The Author Federico Lucifredi is the maintainer of man(1
18%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
: With the help of an image puzzle in vDDoS, the website checks whether a human or a script wants access. The tool can be installed on Linux with just a few lines: wget https://raw.githubusercontent.com
18%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
/en-us/geforce/graphics-cards/gtx-1650/ OpenBLAS: https://en.wikipedia.org/wiki/OpenBLAS cuBLAS: https://developer.nvidia.com/cublas BLAS Level 3 routines: https://docs.nvidia.com/cuda/nvblas/index.html CUDA: https://developer.nvidia.com
18%
User File Recovery
19.04.2018
Home »  HPC  »  Articles  » 
and publicized. To my mind, this pointed to one possible solution to the problem – developing policies in conjunction with management while addressing the resource implications. To begin the development
18%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
way. To my mind, the "Customizing PortSentry" article  [1] complements the topic of this article very nicely and might help you build a super-simple but highly effective security solution if you
18%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
is in $PATH and where it is located. For example, look for perl (Figure 3). Notice that the output tells you where the man pages are located, as well as the binary
18%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
seconds, for example: # nc -p 16000 -w 30 examplehost.tld 22 If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.3
18%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
. Something along the lines of: TID PRIO USER DISK READ DISK WRITE IO> COMMAND 18981 be/4 www-data 0.00 B/s 3.92 K/s apache2 -k start Or, if you were trying to see which system user
18%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
It has a number of modes of encryption that provide additional capability beyond just a straight block cipher. You can read about that at an on-line MCrypt man page. Using mcrypt is very similar
17%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
seconds). If the check program is still running after this time, it is forcibly terminated and its execution is considered to have failed. Lines 3 and 4 are checking for the exit status of the command

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice