Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (216)
  • Article (65)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 29 Next »

16%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
is to put it in a filter: # tcpdump -n -s 1515 -c 5 -i eth1 tcp or udp or icmp This will catch only tcp , udp , or icmp . Tables 3 and 4 show you what you need to know to find all TCP packets with the SYN
16%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
the same test with a 44-million sample test, time mpiexec -n 44 mpiPI-44M Figure 4: btop [12] visualizing CPU core activations
15%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
07 if [ -n "$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then 12 ocf_log err "Config $OCF_RESKEY_config doesn
15%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
[i] + b[i]; } When the number of cycles is known at compile time, a loop can be fully unrolled: c[0] = a[0] + b[0]; c[1] = a[1] + b[1]; c[2] = a[2] + b[2]; c[3] = a[3] + b[3]; However, it remains
15%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
, appearing in alphabetical order but allowing intervening letters, you can use the search expression: "a.*e.*i.*o.*u" This would match lines 1, 2, and 3. If you want lines containing all five vowels in order
15%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
(HostCt, ServerOwner, Date) %>% 106 arrange(desc(HostCt)) 107 head12 <- head(top12, 25) 108 109 mergedTop25 <- rbind(head1,head2,head3,head4,head5, head6,head7,head8,head9,head10,head11,head12) 110 111
15%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
-system svclb-traefik-p46m5 2/2 Running 0 11m kube-system coredns-d798c9dd-kjhjv 1/1 Running 0 12m kube-system traefik-6787cddb4b-594
15%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
11 12 v=0 13 o=alice 53655765 2353687637 IN IP4192.168.1.10 14 s=- 15 t=0 0 16 c=IN IP4 192.168.1.10 17 m=audio 5678 RTP/AVP 0 1 3 99 18 a=rtpmap:0 PCMU/8000 The most widespread NAPT technology
15%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
, including HPC, as you can see with the Compute Blade (Figure 3). Ivan Kuleshov had started work on CM4-based carrier boards designed to fit in standard rack structures (1U), and he created a
15%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
time: 11.79 secs Data transferred: 2.47 MB Response time: 0.22 secs Transaction rate: 35.79 trans/sec Throughput: 0

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice