Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 189 Next »

10%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
problems that occur at the protocol level. You can record the packets yourself with Wireshark or save the sngrep output and open the file directly in Wireshark for further analysis (Figure 5), which helps
10%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
. It's OK. We've all been there. If your paranoia level moves from DEFCON 5 to DEFCON 2 at the mere hint of an insider threat, congratulations, you've joined the ranks of those who have met
10%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
restructure the code for other approaches. Loop interchange Swapping inner and outer loops, a typical use is to improve cache data locality [5]. Loop reversal Running the loop
10%
Grid Engine: Running on All Four Cylinders
21.09.2012
Home »  HPC  »  Articles  » 
, there is no requirement to ship source code. The latest official released source code from Sun was version 6.2 Update 5. One of the more interesting aspects of HPC is the use of open source for much of the cluster
10%
Fedora 16
01.03.2012
Home »  Articles  » 
 
interested in the development tools that Fedora 16 includes, such as Perl 5.14, the GCC Python plugins, the Haskell platform, and D2 – the latest version of the D programming language – or the SELinux access
10%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
192.168.60.0/24 raddr 192.168.2.0/24 } IPsec {encr_algs aes encr_auth_algs sha1 sa shared} and finally, the definition of the shared secret from /etc/inet/ike/secret/ike.preshared (Listing 5
10%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
.77 4.11 mandel 5.55 31.15 65.44 824.68 156.68 5.67 pi_sum 0.74 18.03 1.08 328.33 164.69 0.75 rand
10%
Exploring the Linux Tuning Guide for AMD Opteron 6200 Series Processors
16.07.2012
Home »  HPC  »  Articles  » 
these alternative systems do not support the new instructions or offer “Bulldozer”-specific optimizations. For compilers, the Tuning Guide recommends GCC 4.6.2, GCC 4.7, Open64 4.5, or PGI 11.9. As noted previously
10%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
_ga_nai . The payload is combined with the sysinternal tool pslist.exe and renamed pslist2.exe . Unfortunately (for the attacker), the score at Virus Total improves only slightly (see Figure 5
10%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
5). This is not the same as listing all mounted filesystems, which is accomplished with the mount command, which lists all network filesystems, as well

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice