Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2222 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1174)
  • Article (301)
  • News (173)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 166 Next »

28%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
the traffic is pretty easy by giving each network interface (NIC) in the node an IP address with a different address range. For example, eth0 might be on a 10.0.1.x network, and eth1 on 10.0.2.x network
28%
How to query sensors for helpful metrics
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by patricia serna on Unsplash
--name flux18 --volume /var/pods/flux18/etc:/etc/influxdb:Z --volume /var/pods/flux18/data:/var/lib/influxdb:Z --net pub_net --ip 192.168.2.81 --mac-address 52:54:C0:A8
28%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
://docs.docker.com/engine/security/security/ User namespaces have arrived in Docker!: https://integratedcode.us/2015/10/13/user-namespaces-have-arrived-in-docker/ CIS Docker 1.11.0 benchmark: https://benchmarks.cisecurity.org/tools2/docker
28%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
, these are standard input (FD=0), standard output (FD=1), standard error output (FD=2), and the bpf driver for the Berkeley packet filter (FD=3). The fourth column describes the type of file descriptor, and the FLAGS
28%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
, information from the community, and trial and error. In any case, you will want to deactivate the print spooler services on your Tier 0 systems permanently (Figure 2). If you set up shared printers in your AD
28%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
; it automatically backs up all of the configuration files and the database content with a single command: /usr/share/openqrm/bin/openqrm state backup -n 5.2.before-update The following command lists all backups
28%
PC over IP
03.09.2013
Home »  Articles  » 
 
also calls Desktop Portals — are based on commercial thin client hardware and come from vendors like HP, Wyse, Fujitsu, and Dell (Figure 2). Figure 2
28%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
an integer argument, it creates an array of that length, initializing the values with a stepped sequence: In: np.arange(3) Out: array([0, 1, 2]) The arange() method optionally takes additional arguments
28%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
-build --version 02   BoxGrinder Build 0.10.2 03 04   Available os plugins: 05    - rhel plugin for Red Hat Enterprise Linux 06    - centos plugin for CentOS 07    - fedora plugin for Fedora 08    - sl plugin
28%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
is a minute 58KB. This methodology really appeals to my sense of simplicity: highly effective data basing with the use of tiny text files. Figure 2 demonstrates RRDtool’s graphing capabilities

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 166 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice