Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: kinds Man high line mind(711bmw.com)kinds Man high line mind(711bmw.com)w3c ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (99)
  • Article (40)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next »

17%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
\n\ Host\: %c\n\ Date\: $(date)\n\ " | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & Each time a running service port is probed, you can do far more than just logging
17%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
)\n\Process\: %d (pid %p)\n\User\:%u\n\Host\: %c\n\Date\: $(date)\n\" | /usr/bin/mail -s "Connection to %d blocked" chrisbinnie@email.com) & The SPAWN command has lots of other uses, including communicating
17%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
, C++, and Python. Ganglia has also gained a new web interface with custom graphs. At a high level, Ganglia comprises three parts: The first part is gmond , which is the part of Ganglia that gathers
17%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
line has just a few columns of output (the man pages for iostat were used for the list below): %user: The percentage of CPU utilization that occurred while executing at the user level (this
17%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
, find the line that begins with email, and replace icinga@localhost with your email address: email @.com By default, notifications in Icinga are not enabled. To do this, you can edit
17%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
also churn up Amazon services through a command-line interface or trigger them programmatically using the provided APIs. This article describes how to implement a web server with a high-availability back
17%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
-project of the larger Open MPI community [2], is a set of command-line tools and API functions that allows system administrators and C programmers to examine the NUMA topology and to provide details about each processor
17%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
command line (Figure 3). First select the computer with the backup you want to restore with the following command: sethost client.example.com Figure 3
17%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
to Capsicum. The man page also lists numerous system functions of the libc C library that are affected by Capsicum. Capsicum therefore requires that you plan your applications carefully. This task is certainly
17%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
addresses are displayed and not DNS names. If you would like to see a number options implemented at the command line, you can enter something like the following command, as shown in the logwatch man pages

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice