Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (659)
  • Article (171)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 Next »

9%
Automation with Ansible
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wavebreak Media Ltd, 123RF.com
-playbook \ -i inventories/hosts.baremetal \ --vault-password-file ~/.vaultpass \ --ask-sudo-pass site.yml The vault file itself can be checked into version management without any problems; it is AES256
9%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
verify these checksums: import hashlib def calculate_checksum(log_entry): return hashlib.sha256(log_entry.encode('utf-8')).hexdigest() # Example log entry log_entry = "2024-06-15 12:00:00 Failed login
9%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
but differ in terms of RAM size and hard drives: The 3655 comes with 96GB of RAM and four 600GB hard disks, and the 3695 is lavishly equipped with 256GB of RAM and eight 600GB hard disks. On the network side
9%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
instances; Xen uses credits to handle this internally. By default, all resources are equally distributed and have a credit value of 256. The documentation recommends increasing the value for the hypervisor
9%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
be done more efficiently. In the past, IPv4 addresses were assigned either as Class A (16 million), Class B (65 thousand), or Class C (256), which resulted in some very inefficient allocations (e
9%
Backup tools to save you time and money
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Melissa King, 123RF.com
. Also, you can encrypt the archives with either AES 128 or AES 256. One aspect I liked was the ability to drop directories from the file explorer directly into Areca. The Areca forum has relatively low
9%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
). You can specify the number of threads to use and the block size, as in this example, % pbzip2 -p 8 -b15vk massivetarball.tar which uses eight threads and a block size of 1500KB (1.5MB). A second
9%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
has the following specifications: 4 cores at 3.8GHz (turbo to 4.2GHz) 4MB L2 cache 384 Radeon cores 800MHz GPU clock speed DDR3 1866MHz memory 100W Putting both the CPU
9%
Routing with Quagga
19.02.2013
Home »  Articles  » 
to a 100Mb network, the path through the faster router wins. Where the paths are equivalent, the administrator can manually add a weighting value to the configuration, which is then reflected in the LSA
9%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
of the memory: dd if=/dev/fmem of=memory.dd bs=1MB count=512 Another tool for dumping memory is the kernel module crash , which was developed by Red Hat. Just like fmem , crash creates a pseudodevice called

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice