Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1133)
  • Article (286)
  • News (72)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 150 Next »

15%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
-world.sif /bin/bash For Singularity versions 3.0+, this option causes Singularity to look for Nvidia libraries on the host system and automatically bind mount them to the container. Singularity can “bind mount
15%
Singularity – A Container for HPC
21.04.2016
Home »  HPC  »  Articles  » 
simple: You execute it like any other MPI binary: > mpirun -np 4 -hostfile ./hostfile hello_mpi.sapp node 0 : Hello world node 1 : Hello world node 3 : Hello world node
15%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
: address space. In theory, IPv4 has about 4.3 billion usable addresses; however, in practice many cannot be used (i.e., all of 127.* is reserved for your local link, 10.* is reserved for internal networks ... 3
15%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
by sending a router advertisement (RA) to the link-local multicast address FF02::1 (all nodes; Figure 3). Figure 3: Normally, a regular router responds
15%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
in the root directory of the Gophish installation. Compiled packages for Linux, macOS, and Windows are available for download [3]. To get started, simply unpack and start the Gophish server. Penetration
15%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
Access Service (RRAS) multitenant gateways Load balancers Network Controller also supports configuration and management of IP subnets, VLANs, Layer 2 and Layer 3 switches, and network adapters
15%
FreeRADIUS for WiFi hotspots
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Tyler Olson, 123RF.com
the hash, for example, with sha1sum for SHA-1: echo -n "magazine" | sha1sum This entry in the users file, ADMIN SHA-Password := "e3d5a52968cef277f476a78124d8e05f1d558953" replaces the one above. One
15%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
since 2009 by GreenSQL LTD in Israel. Until version 1.3, GreenSQL was released under an open source license [2]. Version 2 was released in 2012 under a proprietary license with a free Express version
15%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
can also protect Exchange Server 2007 SP3/2010 SP2. Basically, the tool creates templates for Group Policies that integrate Microsoft recommendations. Administrators can customize the policies to meet
15%
System Logging for Data-Based Answers
25.01.2018
Home »  HPC  »  Articles  » 
the load averages for the entire node for the past 1, 5, and 15 minutes, so if you have 16 cores, you could see a load average of 16.0. Keep this in mind as you process the logs. If you have a heterogeneous

« Previous 1 ... 108 109 110 111 112 113 114 115 116 117 118 119 120 121 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice