Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1266)
  • Article (320)
  • News (209)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 180 Next »

9%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
bo in cs us sy id wa 0 0 1360 27788 125860 269804 0 0 390 43 308 572 8 3 84 5 In this case, it’s the io section you’re interested in. Input/Output is seemingly defined
9%
Editorial
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
the passwords these "security experts" were using to protect their data? Some of the passwords uncovered in the attack were: HTPassw0rd Passw0rd!81 Passw0rd Passw0rd! Pas$w0rd Rite1
9%
hwloc: Which Processor Is Running Your Service?
07.11.2011
Home »  HPC  »  Articles  » 
shows an example of how Linux outputs this information for x86 architectures. Listing 1: Linux Topology $ cat /proc/cpuinfo [...] processor  : 3 [...] physical id  : 0 siblings  : 4 core id    : 3 cpu
9%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
.g., Wireshark). Despite this failing, VLANs are considered safer than normal networks. In truth, a network is also based on a VLAN where all nodes on the network work with a VLAN ID of 0. Multivendor VLANs
9%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
 because, typically, head nodes or workstations open ports 22 (SSH), 443 (HTTPS), and sometimes 80 or 8080 (HTTP). Can I find terminal-sharing tools that use these ports? Moreover, can a web browser be used for terminal
9%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
if page.get('Contents') is not None: 21 for file in page.get('Contents'): 22 s3pump(file.get('Key'), bucket) Data Highway? For large S3 buckets with data in the multiterabyte
9%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
, with 45 percent saying it will increase slightly and 32 percent stating it will increase significantly. Only 22 percent of respondents claimed open source adoption will remain the same and one percent
9%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
was received [2]. Modular Extensions for Apache Apache version 2.2 and newer has a mod_reqtimeout extension that lets you configure the RequestReadTimeout option, which you can use to set different request
9%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
 data copy(a) !$acc parallel loop   do i=1,n     a(i) = 0.0   enddo !$acc data end   #pragma acc data copy(a) {   #pragma acc parallel loop   {     for (int i=0; i < n; i++)     {       a[i] = 0.0
9%
Run Kubernetes in a container with Kind
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
-Lo ./kind https://kind.sigs.k8s.io/dl/v0.10.0/kind-linux-amd64 $ chmod +x ./kind $ mv ./kind /usr/local/bin/kind $ kind --version kind version 0.10.0 Get an incredibly quick start

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 180 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice