Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (950)
  • Article (296)
  • News (175)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 143 Next »

17%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
are the following lines in /etc/libvirt/libvirtd.conf: listen_tls = 0 listen_tcp = 1 auth_tcp = "none" The configuration shown does not use any kind of authentication between cluster nodes, so you should exercise
17%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
the CVM and the hypervisor. The 192.168.5.0 network is used for this purpose. The hypervisor always has the IP address 192.168.5.1 and the CVM the IP address 192.168.5.2, which means the installation
17%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
14 if __name__ == '__main__': 15 app.run(host="0.0.0.0", port=5000) Listing 4 my-app/webapp/Dockerfile 01 FROM python:3.11 02 WORKDIR /app 03 COPY . . 04 RUN pip install Flask
16%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
’s IP address. Roughly, it should look something like Listing 1. The IP address of the master node is 10.1.0.250. Be sure to check that the compute nodes can ping this address. Also be sure that ntp
16%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
filesystem, a CD-ROM drive in Linux is usually a file called /dev/cdrom (actually, it's a symlink to /dev/sr0 for a SCSI drive), which streams data from your hardware to the system. For security reasons, when
16%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
in a loop. Thus, the application can be switched to Capsicum capability mode with just two additional lines of program code: if (cap_enter() < 0) error("cap_enter: %s",pcap_strerror(errno)); The following
16%
PC over IP
03.09.2013
Home »  Articles  » 
 
and easily with the ping scan method (-sP ; Listing 1). Listing 1: IP Address Discovery with Nmap $ nmap -sP 192.168.0.0/24 | grep pcoip Nmap scan report for pcoip-portal-008064862335(192.168.0.190) Nmap
16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments
16%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
-build --version 02   BoxGrinder Build 0.10.2 03 04   Available os plugins: 05    - rhel plugin for Red Hat Enterprise Linux 06    - centos plugin for CentOS 07    - fedora plugin for Fedora 08    - sl plugin
16%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
machine or flood a network). Even from the default view, with iftop -i eth0 where -i declares which interface you want to monitor, you can simply press the f key to enter one of the many filters

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 143 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice