Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 113 Next »

10%
GlusterFS
27.03.2012
Home »  HPC  »  Articles  » 
GlusterFS combines the unused storage space on multiple servers to create a single, large, virtual drive that you can mount like a legacy filesystem – using NFS or FUSE on a client PC. And, you can
10%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
or metamorphic code that regularly generates slightly modified variants of a malicious program with virtually identical functionality. The objective of this procedure is to modify the structure of the malware so
10%
Routing with Quagga
19.02.2013
Home »  Articles  » 
configuration files for a Linux system that exchanges routes with Cisco devices. Figure 1 shows the simple network setup. The Dynamips software simulates the virtual Cisco routers. Listing 1: zebra.conf  for
10%
Top PowerShell Cmdlets
14.05.2013
Home »  Articles  » 
 
In PowerShell 3.0, Microsoft lets admins manage, install, or adapt virtually any service on a Windows server via the shell. In this article, I introduce some of the new and interesting commandlets
10%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
about CephX Ceph encryption and how a Ceph cluster could be used as a replacement for classic block storage in virtual environments. Now, it’s time to talk about what to do when things go wrong. Those
10%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
virtually all of them; however, some of the methods are pretty handy. The simplest way is to specify the nodes on the command line is to use the -w option: [laytonjb@home4 ~]$ pdsh -w 192
10%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
, which in turn necessitated a distributed hardware layout. It is difficult to implement (at least virtual) centralized memory for the large numbers of processors in a distributed system, so SMP increases
10%
Programming with OpenMP
07.11.2011
Home »  HPC  »  Articles  » 
to synchronize all the threads.The  #pragma omp barrier statement sets up a virtual hurdle: All the threads wait until the last one reaches the barrier before processing can continue. But think carefully before
10%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
try to control their input (if they have any). And finally, great news – I can read virtually the whole content of /etc and /var directories. Access to the /etc and /var directories gives me
10%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
direct administrative jurisdiction. If you’re using virtualization technology as a Windows administrator, you’re using Linux whether you know it or like it. The exception would be Hyper-V: It’s possible

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice