Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 163 164 165 166 167 168 169 170 171 172 173 174 175 176 ... 200 Next »

12%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
to your command. When you receive the expected response, you enter another command and so on. Expect works in the same way, except you have to provide the script with commands and expected responses
12%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
Kit is the polkitd daemon. Because it only needs to respond to requests from system tools, it runs on a restricted account. Therefore no one can use it to hijack the system. polkitd provides its functions via the D
12%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
); and DSPs (digital signal processors) have risen in popularity. These accelerators have the potential to provide much better performance in applications and algorithms that can take advantage of them compared
12%
The Meson Build System
16.07.2014
Home »  HPC  »  Articles  » 
. Meson does not support IDEs yet, but the build system provides an API that any developer can use to integrate Meson into their favorite IDE. A simple GUI is in its infancy (Figure 4). If you want
12%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
files and directories outside home directory might provide a means for escalating privileges. Metasploitable revealed 1070 such entries. Among these writable files and directories, two directories
12%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
(Secure Shell). SSH is the secure equivalent of the old Telnet application; it provides an interactive shell session on the remote system from which you can work at the command line. Also, you can direct
12%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
, was becoming popular. It provided a way to utilize other processors in the same system or processors on other systems. Additionally, OpenMP was released, providing a threading model for applications
12%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
, gfortran provides coarray functionality from Fortran 2008 starting with version 5.1. It uses the coarray capability in OpenCoarrays. The compiler translates the coarray syntax into library calls
12%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
 modprobe nvmet-tcp The NVMe target tree will need to be made available over the kernel user configuration filesystem to provide access to the entire NVMe target configuration environment. To begin, mount the kernel user
12%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
Containers provide reproducible, portable applications. In a sense, they are an evolution of virtual machines (VMs), but without the entire operating system (OS). Therefore, containers are a bit

« Previous 1 ... 163 164 165 166 167 168 169 170 171 172 173 174 175 176 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice