Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub 12%25390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (155)
  • Article (49)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21 Next »

26%
MPI Apps with Singularity and Docker
18.03.2020
Home »  HPC  »  Articles  » 
        2 hours ago         9.83GB                                         49cbd14ae32f        3 hours ago         269MB ubuntu              18.04               72300a873c2c        3 weeks ago         64.2MB
26%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
: 42 Celsius federico@voronoi:~$ Infos Sound-proofing a Picocluster: https://twitter.com/0xF2/status/1244422315011645444 Noctua NF-A6x25 PWM, Premium Quiet Fan, 4-Pin (60mm): https
26%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny
26%
File Compression for HPC
10.11.2021
Home »  HPC  »  Articles  » 
a directory -v or -vv  creates verbose output -b uses bzip2 compression -g uses gzip compression -l uses lzo compression -L n uses compression level n (1 -9 , with 7 being the default
26%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
} 19 20 -re "($|%|>) " { interact } 21 22 timeout { 23 send_tty "No response from $host\n" 24 exit 25 } 26 } The script begins as usual by saving its arguments into variables
26%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
, as in this code fragment, which implements and calls a multiply function: package function multiply(a,b) = m { m := a*b } result1 = r { r := multiply(3,4) } result2 = r { r := multiply(3,9) } The Rego
26%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
for i in range(N): 61 A = column(cpu_percent, i); 62 plt.plot(epoch_list, A); 63 # end if 64 plt.xlabel('Time (seconds)'); 65 plt.ylabel('CPU Percentage'); 66 plt
26%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
5221548db 58 seconds ago 5.67MB 80dc7d447a48 About a minute ago 167MB alpine 3.9 78a2ce922f86 5 months ago 5.55MB The command you really
26%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
-b81d-c42b-c008-a70649501262 05 # stmfadm add-view -h myiscsiclient -t myiscsiserver -n 1 600144f05f71070000004bc999020002 # cat /etc/iscsi/initiatorname.iscsi InitiatorName=iqn.1993-08.org
26%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
to encrypt my data with a very long cipher key (almost as large as I can get). According to the Evil 32 website [9], using modern GPUs, 32-bit key IDs can be decoded. They say that it only takes four seconds

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice