Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 95 Next »

6%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
. You simply type screen  to get started. Although you won’t really see any difference in the terminal, you have started screen . To show you what it can do, start a download: $ wget https
6%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
). Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
6%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
). Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
6%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
without entering a password. That said, it does makes sense to share your own experiences with the Metasploit community – for example, on GitHub [6]. Armitage and Meterpreter To get a quick taste
6%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
In two previous articles [1][2], I introduced how to bring up lightweight container machines with Footloose and cloud virtual machine stacks on a laptop with Multipass. The Footloose approach didn
6%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
configuration. Master Node Because the master node effectively controls the cluster, getting the OS configuration correct is important. Fortunately, only a small number of changes need to be made to the image
6%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
will get a version of the file as it existed when it was copied; that is, you will not have a backup of the final data because it was in the process of being written when the backup occurred. Also, any file
6%
Setting up and using Azure Active Directory
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kheng Ho Toh, 123RF.com
browser below https://portal.office.com and using a synchronized user account. After entering the user's UPN, the Office 365 login page will redirect the browser to ADFS. There, the user
6%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
://www.howtoforge.com/tutorial/how-to-install-and-setup-drbd-on-centos-6/ "Automated Monitoring with Pacemaker Resource Agents" by Martin Loschwitz, Linux Magazine , issue 139, June 2012, pg. 14, https://www.linuxpromagazine.com
6%
File Compression for HPC
10.11.2021
Home »  HPC  »  Articles  » 
.data.bz2 , which leaves file.data intact. You can also use the -k option to do the exact same thing, but with a simpler command line: $ bunzip2 -k file.data To get a little more information about how

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice