Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (707)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 101 Next »

15%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
many packets or remote procedure calls (RPCs) are created and sent. For example, if you want to transmit 1MB of data using 32KB chunks, the data is sent in quite a few chunks and a correspondingly large
15%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
_SEND() and MPI_RECV() or their non-blocking equivalents for sending the data from one process to another. You just access the remote data using the coarray syntax and let the underlying coarray library do the work
15%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
passwordless SSH and pdsh, a high-performance, parallel remote shell utility. MPI and GFortran will be installed for building MPI applications and testing. At this point, the ClusterHAT should be assembled
15%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
to a remote block device – specifically, an NVMe target. (2) The target will be the server exporting the NVMe device across the network and to the host server. A Linux 5.0 or later kernel is required on both
15%
Update on Containers in HPC
08.07.2024
Home »  HPC  »  Articles  » 
make up just 13% of the votes.   Q: In what context(s) are you using containers? HPC applications or simulations Developer environments (local machine) Kubernetes Remote developer
15%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
://www.portknocking.org/view/implementations "Remote Access Security with Single-Packet Port Knocking" by Juliet Kemp, Linux Magazine , June 2008: http://www.linux-magazine.com/Issues/2008/91/Single-Packet-Port-Knocking/(language)/eng-US "The Sys
15%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
moves data from the internal network to a remote network. The key to arresting the hacker lifecycle is to reduce the dwell time – the time between the initial attack and detection. One security
15%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
are executed. The control directive in profile 1 has to have an include_controls statement for the control directives from role 2 that are to be called there. If a remote role comprises several control
15%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
to cache. Remote IIS Management In PowerShell and Windows Admin Center, you can access a server running IIS over the network. Although this is also possible with IIS Manager, it is far more complicated
15%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
to update Jenkins plugins online, I couldn't connect a plugin to remote software as a service (SaaS) because it was using self-signed security certificates that were not recognized by Jenkins. The Version

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice