Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 400 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (222)
  • Article (49)
  • News (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 29 Next »

26%
Bashtop, a Gorgeous Top-like Tool
10.06.2020
Home »  HPC  »  Articles  » 
top -like tool. Even better, it’s written in about 3,400 lines of Bash. The main author is taking some time to rewrite parts of bashtop so that it uses psutil , a popular library of simple system
26%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
policy modules that are available and active on the system. The file is stored below /etc/selinux: # ls -lh /etc/selinux/targeted/policy/total 3.6M -rw-r--r--. 1 root root 3.6M Mar 3 13:28 policy.29
26%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
the registers and main memory, Level 1 (L1), Level 2 (L2), and even L3 and L4 caches have been added. Typically the L1 cache is part of the processor (each core) and can store more data than the registers
26%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
the registers and main memory, Level 1 (L1), Level 2 (L2), and even L3 and L4 caches have been added. Typically the L1 cache is part of the processor (each core) and can store more data than the registers
26%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
="left" valign="top"> 16 17 18 19 Once the list of commands is loaded, the target attribute is again used
26%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
-virus gateways can buy the server without virus protection. For example, a license for 100 users without anti-virus costs about EUR 2,400; anti-spam and anti-virus protection puts the price up to EUR 3
26%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
the server without virus protection. For example, a license for 100 users without anti-virus costs about EUR 2,400; anti-spam and anti-virus protection puts the price up to EUR 3,100. These functions
26%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
machine. On the basis of these hardware conditions, I gradually increased the number of checks, starting with 1,000 checks, then moving up to 1,400, and finally 2,200. Figure 3 shows how Nagios latency
26%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
your tuning actions. Are you looking for a shorter response time or more throughput? One objective could be, say: "Action X takes 3.5 seconds to complete after clicking – in future, we want to be done
26%
CronRAT Malware Targets Linux Servers
29.11.2021
Home »  News  » 
 
and not that the date of the task is legitimate. The crontab date specification for ConRAT is 52 23 31 2 3, which would generate a run time error upon execution. However, that runtime will never happen, because the date

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice