Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (976)
  • Article (282)
  • News (126)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 139 Next »

22%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
of information, a multiple-kilobyte buffer is created in the kernel. The Linux developers have implemented an antidote for this in the form of the system calls signalfd and eventfd. The CPAN Linux::FD module [6
22%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
-performance requirements, although it is not uncommon in smaller companies. The setup also allowed the candidates to test on equal terms. Version 1.97 of Bonnie++ [5] and IOzone 3.429 [6] were the test tools. To begin, I
22%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
to OpenStack integration is evidenced by the detailed documentation on the topic of “RHSS and OpenStack” in the RHSS guide (Figure 6). Figure 6: If you
22%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
the addition of modules. SQLmap needs Python version 2.6 or newer. The Takeover function also requires the Metasploit framework. SQLmap supports any popular database system, such as MySQL, PostgreSQL, Oracle
22%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
to select the source and target addresses, which are referred to as local and remote . Typically, only restrictions on remote addresses will be relevant. In the input field, you can enter both IPv4 and IPv6
22%
Virtual switching with Open vSwitch
28.07.2011
Home »  CloudAge  »  Articles  » 
 
time. To do so, load the kernel module manually: modprobe datapath/linux 2.6/U openvswitch_mod.ko If this command fails, you probably need to unload a bridge module: rmmod bridge. The kernel module
22%
MobaXterm: Unix for Windows
23.07.2012
Home »  Articles  » 
 
registered. Figure 6 shows how easy it is to access a KVM hypervisor virtual machine via VNC. Figure 6: MobaXterm also enables quick graphical access to a VNC
22%
Tuning ZFS for Speed on Linux
17.03.2020
Home »  HPC  »  Articles  » 
device partition as the SLOG to the pool, enter: $ sudo zpool add myvol log nvme0n1p2 Then, verify that the cache volume has been added to the pool configuration (Listing 6). Listing 6: Verify Pool
22%
Blending Java with other programming languages
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
has a treasure trove of packages in its repository. However, if you need to integrate legacy Java applications, Jython is definitely an interesting option. Rhinos to the Rescue Java 1.6 saw
22%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
, such as the free antivirus ClamAV [5] or the free anti-malware tool Linux Malware Detect (a.k.a., maldet) [6], would be another interesting use case for Watchman. The maldet tool uses the Linux inotify facility

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 139 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice