Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (846)
  • Article (205)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 114 Next »

18%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
18%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
such as square root, cosine, or sine. Fortran 90 also introduced derived data types (custom data types). Before Fortran 90, you could not create your own data type; however, creating a derived data type
18%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
you install it into /usr/local as root. The other option is to build the code and install the tool in your user account; for example: ./configure --prefix=/home/laytonjb/bin/agedu Then you just
18%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
between 1 and n , the number of images. Notice it starts with a 1 and not a zero, which is perhaps influenced by the Fortran roots. In the application code, you define a coarray with a trailing
18%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
. In this case, the template is *.dat.2 , which means find will locate any file that ends in .dat.2 (note the use of the * wildcard). If I truly get desperate to find a file, I'll go to the root directory
18%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
as root, be careful. For example, to run the EP benchmark use: time mpirun -np 6 -h ./hostfile ep.B.x The output could be written to a random file in /tmp and parsed for the runtime. The benchmark time
18%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
 following commands on the system – in my previous example, this would be laytonjb-desktop : $ sudo chmod u+s $(which screen) $ sudo chmod 755 /var/run/screen Note that these commands need to be run by root
18%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
the total size, use the command du -sh  on the root directory (/). Recall that /home  and /opt  are NFS exported to the compute node so the output of the command includes the space for those directories
18%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
Docker detractors believe the root of the problem is Docker's overlay design, because they think its modifications are too wild, but the security also leaves something to be desired. A Docker container
18%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
to manually create a log folder, as follows: $ sudo mkdir /var/log/suricata $ sudo mkdir /etc/suricata Make sure these folders are owned by the Suricata process, as well as by root. Then, copy the files

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 114 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice