Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (720)
  • Article (211)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 105 Next »

14%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
of vulnerabilities in container images is a good example. Projects such as Clair [11] and Nautilus [12] have only recently developed the capacity for detecting vulnerabilities in container images (Figure 1
14%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Levente Janos, 123RF.com
ALL 04 $ sar -f /var/log/sysstat/sa07 -s 23:30:00 -e 23:55:00 -P 1,2 However, filtering by specific days is often not enough, so you can filter for a time interval by passing -s [
14%
Provisioning resources with an Azure-specific language
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © vectortatu, 123RF.com
: location 11 sku: { 12 name: 'Standard_LRS' 13 tier: 'Standard' 14 } 15 kind: 'StorageV2' 16 properties: { 17 accessTier: 'Hot' 18 } 19 } To add
14%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
rel="stylesheet" href="style.css" /> 05 {% endblock %} 06 07 08
    09 {% for item in seq %} 10
  • {{ item }}
  • 11 {% endfor %} 12
13 14
14%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
: 6 08 microcode : 0x60c 09 cpu MHz : 800.000 10 cache size : 6144 KB 11 physical id : 0 12 siblings : 2 13 core id : 0 14 cpu cores : 2 15 apicid
14%
Review: Accelerator card by OCZ for ESX server
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© gortan123, 123RF.com
in sizes from 1.2 to 3.2TB. Infos Database acceleration with VXL: http://www.oczenterprise.com/whitepapers/whitepaper-accelerating-ms-sql-server-2012.pdf
14%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
 the last command as an example, an option to specify the extent size would be: # vgcreate -s 8M vg0 /dev/sdb1 /dev/sdd The -s 8M  option specifies a PE size of 8MB when the VG is created. You can change
14%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
] Python [6] Julia (up and coming) [7] Java [8] Matlab [9] and Matlab-compatible tools (Octave [10], Scilab [11], etc.) Java is the lingua franca of MapReduce [12] and Hadoop
14%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
400 Oct 20 00:00 ssh.23:00:00-00:00:00.log.gz -rw-r--r--. 1 root root 1268 Oct 19 22:00 weird.21:34:12-22:00:00.log.gz -rw-r--r--. 1 root root 2477 Oct 19 23:00 weird.22:00:00-23:00:00.log.gz -rw
14%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
Modules xm_gelf 09 10 11 # Use for windows vista/2008 and higher: 12 modules in the_msvistalog 13 14 # Use for windows Windows XP/2000/2003: 15 # Modules in_mseventlog 16 17

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 105 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice