Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 113 Next »

10%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 sizes:                   43 bits physical, 48 bits virtual CPU(s):                          64 On-line CPU(s) list:             0-63 Thread(s) per core:              2 Core(s) per socket:              32 Socket
10%
Analyzing Logs
03.11.2022
Home »  HPC  »  Articles  » 
a virtual machine (VM). Of course, these logs need to be tagged with the originating system so they can be differentiated. When you get to the point of log analysis, you really aren’t just talking about
10%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
this if you google for how to put quotas on folders or add users to a new group and put quotas on that group. The directory created is for installing packages. You also need space for Python virtual
10%
Getting Data Into and Out of the Cluster
14.08.2023
Home »  HPC  »  Articles  » 
are connected to the corporate or university network by a virtual private network (VPN). VPNs allow you to connect to networks from virtually anywhere in the world if you have access to the Internet. (I
10%
Coming to grips with grep
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Andrey Lavrushov, 123RF.com
seguridad, \ anáslisi de aplicaciones Next, I'll look directly at the /proc virtual filesystem (as opposed to querying the process table per se), which doesn't contain "real files," and look
10%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
service apache restart enables the extended configuration by restarting the web server. Listing 1 apache.conf 01 Listen 8080 02 <VirtualHost *:8080> 03 DocumentRoot /home/pa/www 04
10%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
networks and servers – physical, virtual, cloud, or otherwise – that they want to monitor. For example, you might want to keep tabs on your LAN at home, check in on a remote office, or even monitor your
10%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
if something bad occurs. Given that most enterprise networks have hundreds or thousands of networked information systems, vulnerability analysis and assessment by manual methods are virtually impossible
10%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
and semantics, assigning data types to the objects of their sub-tree and defining their own data types, if necessary – either scalar types (virtually anything that is not a table) or tables that represent
10%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
Redmond but has continuously expanded its portfolio in recent years to include virtual private network (VPN) services, security solutions for mobile systems such as Android and iOS, and protection software

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice