Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 154 Next »

11%
HPC Storage – I/O Profiling
26.01.2012
Home »  HPC  »  Articles  » 
capture local I/O using iostat), so the most likely use of iostat is on the storage server or servers. nfsiostat A tool called nfsiostat, which is very similar to iostat, is part of the sysstat collection
11%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
configure settings for RandR [4] in Linux. The call to xrandr is pretty bulky: xrandr --fb 1600x900 --output LVDS1 --mode 1600x900 \ --scale 1x1 --output HDMI3 --same-as LVDS1 --mode 1920x1200 \ --scale
11%
Just-in-time administration in Active Directory
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Orlando Rosu, 123RF.com
or in an event-controlled manner in an orchestration or identity management system. The calling account must have the appropriate rights in AD. With PowerShell, all you need is the AD module, which is part
11%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
A few years ago I was spending a great deal of time on call – day and night. It rapidly became obvious that we needed to implement company-wide server security that would be effective when on-call
11%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
, it duplicates it back to SW1, and the process repeats forever. This phenomenon is called a broadcast storm, which can consume all available CPU resources and network bandwidth. The entire network could
11%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
" for the technology, with the essential difference from so-called legacy systems being that all management components of the storage layer run as pods in the Kubernetes cluster itself. Of course, this is not a unique
11%
Container IDE with cloud connection
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Christin Hume on Unsplash
-time environment as needed, which you call in the browser without having to worry about the technical underpinnings. The Rub Everyone will be familiar with this scenario: A project you recently discovered and find
11%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
in this article? Can only a few people do this? The know-how and software are easily obtained on the Internet, such as the Mimikatz pass-the-hash attack tool. USB sticks that act like a keyboard are called USB
11%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
). Figure 1: A small Lua script that makes use of libguestfs. Calling the Lua interpreter with lua, launches in an interactive mode, in which you can enter code. Alternatively, it executes Lua scripts
11%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
the command center – the Rex host, which is sometimes called Rex Control Master – needs a few software modules. By the way, the Rex developers call the program (R)?ex , which is totally unpronounceable, so I

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice