Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (227)
  • Article (53)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 29 Next »

20%
Roll out hybrid clouds with Ansible  automation
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © markovka, 123RF.com
key_material: "{{ item }}" 09 state: present 10 region: "{{ region }}" 11 with_file: /home/user/.ssh/id_rsa.pub 12 register: sshkey 13 tags: sshkey 14 15 - name: Create VPC INT 16 ec2
20%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
THISREADHANDLE->autoflush(1); 07 08 if ($processed = fork) { 09 close THISWRITEHANDLE; 10 while (defined($text = )) { 11 print $text; 12 } 13 close THISREADHANDLE; 14 waitpid
20%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
Controller login2$ ls -s /sys/devices/system/edac/mc/mc0 total 0 0 ce_count 0 csrow1 0 csrow4 0 csrow7 0 reset_counters 0 size_mb 0 ce_noinfo_count 0 csrow2 0 csrow5 0 device 0 sdram
20%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
3 type rec 4 integer :: x, y, z 5 real :: value 6 end type rec 7 8 integer :: counter 9 integer :: counter_limit 10 integer :: ierr 11 12 type (rec) :: my
20%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
rule phishing_pdf { 02 03 meta: 04 author = "James Stanger" 05 last_updated = "2017-09-12" 06 category = "phishing" 07 confidence = "high" 08 threat_type = "phishing exploit" 09 description
20%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
) 8 (4) 7.2 0.9 Nehalem-EP (2009) 8 (4) 32 4 Westmere-EP (2010) 12 (6) 42 3.5 Westmere-EP (2010) 8 (4) 42
20%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
. The holdingdisk section (lines 22 to 26) specifies the key data for such a holding disk. In Listing 1, Amanda is allowed to cache data in the /amanda/holding directory, where it can use a maximum of 50MB space; any
20%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
] 09 } The next step is to define what action to trigger. The syntax is: watchman -- trigger /opt/repos 'repos-sync' \ -- /usr/local/sbin/sync.sh /opt/repos Where 'repos
20%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
/share/doc/stunnel*/. The example in Listing 1 shows a very simple configuration that uses stunnel as a plain vanilla TLS client. Listing 1 Stunnel as a TLS Client ; global settings sslVersion = TLSv1.2 chroot = /var
20%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
image: monitoror/monitoror:${MTRRTAG:-latest} 05 ports: 06 - "38080:8080" 07 environment: 08 - "MO_CONFIG=/etc/config.json" 09 restart: unless-stopped 10 11 networks: 12 default

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice