Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1278)
  • Article (303)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 175 Next »

9%
Monitoring Cloud Service Charges
17.08.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, 'c1.medium' => 0.19, 'm2.2xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
9%
HDF5 with Python and Fortran
21.03.2017
Home »  HPC  »  Articles  » 
  18      print "dset.shape = ",dset.shape 19  20      print "dset.dtype = ",dset.dtype 21  22      print "dset.name = ",dset.name 23    24      print "f.name = ",f.name 25    26      grp
9%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
9%
Chronicles
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Maxim Kazmin, 123RF.com
can't be bothered to do what's right, although it's your responsibility to be sure they do. That sounds a lot like a classic catch-22 situation. Although, I never read the book or saw the movie, I
9%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
in the directory structure is clear once you've installed it. Script Kiddies and Port 22 As I mentioned, the most popular usage of fail2ban is stopping probes that try every username ever conceived by mankind
9%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
, for a library that uses a specific compiler and MPI library, you would end up with a module names like atlas-3.10.0-opempi-1.6.2-open64-5.0 . The name is useful because it tells the user the library version
9%
Intel Releases Extreme Desktop Processor
02.09.2014
Home »  News  » 
 
with 20MB of Level 3 cache. The eight cores support 16 software threads. Intel makes no secret of the fact that the new chip, which will sell for US$ 999, is targeted for the high-end gaming market
9%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
: In LR-DIMMs, all of the signal lines (including the data) run through an intermediate chip; this reduces the electrical load on the memory controller. LR-DIMMs have an Isolation Memory Buffer (iMB
9%
Malware Discovered in npm Registry that can Affect Linux
15.04.2021
Home »  News  » 
 
about 27 MB in size and included one version (1.0.0). Within the package is a postinstall.js file that extracts an archive named run.tar.xz, which includes an ELF binary named run (the actual malicious
9%
News for Admins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
 
the new offering. Linux Now Set to Always Reserve the First 1MB of RAM To avoid issues that have plagued some systems, the Linux kernel will now unconditionally reserve the first 1MB of RAM. Linux

« Previous 1 ... 69 70 71 72 73 74 75 76 77 78 79 80 81 82 ... 175 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice