Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (88)
  • Article (36)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 13 Next »

100%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
reasonable for average desktop users and is clearly over-the-top if you consider the usual requirements when working on a PC. Nevertheless, many common applications for the desktop are oriented toward ... Desktop search engines such as Tracker, DocFetcher, and Recoll help track down files by their content, even in massive datasets. ... software, desktop, track
89%
Finding and recording memory errors
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
. Rather than risk any of these scenarios, the system rightly crashes, indicating the error as best it can. The Wikipedia article on ECC states that most of the single-bit flips are due to background ... Memory errors are a silent killer of high-performance computers, but you can find and track these stealthy assassins. ... Tracking Memory Errors
82%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
-based Linux distribution that you should only update through BackTrack's own repositories (http://all.repository.backtrack-linux.org/). What Do You Get For Nothing? BackTrack Linux contains more than 300 ... Penetration Testing and security auditing are now part of every system administrator's "other duties as assigned." BackTrack Linux is a custom distribution designed for security testing for all ... BackTrack Linux: The Ultimate Hacker's Arsenal ... BackTrack Linux: The Ultimate Hacker's Arsenal
71%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
in less than one second." If you are facing more of a throughput problem, the objective could be: "Given 30 percent more load next year, we still want the system to respond to an order within 350ms ... Fast Track
63%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
In man-in-the-middle (MITM) attacks, attackers place themselves between the victim and the targeted resources, putting them in a position to intercept, read, and possibly even manipulate ... Detecting and analyzing man-in-the-middle attacks
48%
Memory Errors
23.03.2016
Home »  HPC  »  Articles  » 
Memory errors are a silent killer of high-performance computers, but you can find and track these stealthy assassins. ... check exception (MCE), which should crash the system. The bad data in memory could be related to an application or to instructions in an application or the operating system. Rather than risk any ... Memory errors are a silent killer of high-performance computers, but you can find and track these stealthy assassins.
43%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
Aging data with agedu The explosion of data is a storage burden that all system administrators bear. The agedu  tool lets you discover what data is being used. ... contain thousands, millions, or even billions of files. Tracking how they are being used is very difficult and time consuming. Fortunately, a simple tool named agedu can give you a quick glimpse ... The explosion of data is a storage burden that all system administrators bear. The agedu  tool lets you discover what data is being used.
42%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
Benchmarks have been misused by both users and vendors for many years, but they don’t have to be the evil creature we all think them to be. ... definitely stress the processor(s) and memory, especially the bandwidth. I would recommend running single-core tests and tests that use all of the cores (i.e., MPI or OpenMP). A number of benchmarks ... Benchmarks have been misused by both users and vendors for many years, but they don’t have to be the evil creature we all think them to be.
38%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
Understanding the proliferation of data in your filesystem is key to being an administrator. Understanding file sizes and file ages and their distribution helps you tune filesystems for performance ... are converted to a string (hopefully a real user name) rather than stored as a numeric value. The f sscan tool was derived from this simple example code. It does a great deal more error checking and offers ... Understanding the proliferation of data in your filesystem is key to being an administrator. Understanding file sizes and file ages and their distribution helps you tune filesystems for performance
35%
Monitor your network infrastructure with SNMP
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © lightwise, 123RF.com
. Information about the meaning of individual OIDs is often found on the device manufacturer's website or on relevant Internet forums. Additionally, there are many standardized OIDs (e.g., for names and uptimes ... If you don't have the staff to monitor your network in real time, SNMP and a couple of scripts are all it takes to keep track of your device jungle.

1 2 3 4 5 6 7 ... 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice