Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 216 Next »

42%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
methods for automatically converting CUDA projects to HIP: • Hipify-perl – a Perl script you can run on the CUDA source code to convert it to HIP format • Hipify-clang – a preprocessor that operates from
42%
Bashtop, a Gorgeous Top-like Tool
10.06.2020
Home »  HPC  »  Articles  » 
(% memory and actual memory used) CMD (vertical) – the command used to run the process Pressing f removes the process filter box. Rather than rely on entering a filter, in the process table you
42%
SMART Devices
14.08.2020
Home »  HPC  »  Articles  » 
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system for storage devices that provides information about the status of a device and allows for the running of self
42%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
cost, but on all the other HPC systems, running in universities, research institutions, and corporate server rooms around the world, economy really does matter. Although Red Hat would love to sell you
42%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
. PowerShell scripts run completely in memory and are remote-enabled. The module supports IT managers in the following tasks: Code execution: Execution of low-level code and code injection. Script
42%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
explains on his website that a user who wants to check all variants of "google.com" manually would need more than 300,000 queries and that this number would then increase to more than 5 million queries
42%
EGroupware, Group Office, and Kopano compared
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © 36clicks, 123RF.com
applications help you take data protection seriously by running on an on-premises server so that data does not end up with third parties. Two different strategies present themselves: With conventional client
42%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) is a monitoring system for storage devices that provides information about the status of a device and allows for the running of self
42%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
on the running system or only analyze individual folders, but to be on the safe side and not destroy important data by accidentally writing to the drive, first connect to another system and create a corresponding
42%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
port scanners probing for services running on your servers and banish them outright without fear of them guessing your magic port sequence [1]. At this juncture, it's also worth noting that the long

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice