Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (137)
  • Article (59)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

22%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
Qualys SSL-Test A+ Qualys SSL-Test A Syss GmbH Audits [2] TLS 1.2 Yes Yes Yes Yes HTTPS/HSTS Yes Yes Yes Yes
22%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
,1000); 06 07 // Set host data on the Device (GPU) 08 dA = gpuSetData(A); 09 dC = gpuSetData(C); 10 11 d1 = gpuMult(A,B); 12 d2 = gpuMult(dA,dC); 13 d3 = gpuMult(d1,d2); 14 result = gpuGetData(d3); // Get
22%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
"RevisionId": "aa63-b5c0-4ec2-a5e99", 11 "MemorySize": 128, 12 "Version": "$LATEST", 13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole", 14 "Timeout": 3, 15 "Runtime": "provided", 16
22%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker's most popular tools. This article presents real
22%
Routing with Quagga
19.02.2013
Home »  Articles  » 
OSPF 01 ! 02 hostname linuxrouter 03 password 8 7kdoaul4.iSTg 04 enable password 8 ZDF339a.20a3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09  multicast
22%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
to see what might be causing the load. Figure 8: Disk stats and top processes. One last option I want to cover is n , for network stats. Figure 9
22%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
 acc parallel loop       {          for (j=0; j < m; j++) {             ...          }       }       ...    } } Table 3: Single-Directive Nested Loop Fortran C !$acc parallel loop    do i=1,n       ...       do
22%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
22%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
+----------------------------------+---------+---------------------+ 40 | 47e0142a3638fdc24fe40d4e4fbce3f1 | Row 1 | 2015-09-13 15:24:12 | 41 | b833c1e4c5bfc47d0dbe31c2e3f30837 | Row 3 | 2015-09-13 15:24:14 | 42 | c7d46523a316de4e1496c65c3cbdf358 | Row 2 | 2015
22%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice