Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (281)
  • Article (112)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 41 Next »

18%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
is to put it in a filter: # tcpdump -n -s 1515 -c 5 -i eth1 tcp or udp or icmp This will catch only tcp , udp , or icmp . Tables 3 and 4 show you what you need to know to find all TCP packets with the SYN
18%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
on machines with only one CPU core and 512MB of RAM; the minimalist K3s setup itself only uses 250MB. As one of the radical cost-cutting measures, K3s dispenses with the I/O-intensive etcd database
18%
AWS Elastic Beanstalk
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Aleksandra Glustsenko, 123RF.com
]: y remote: remote: error: Unable to deploy application version: No Environment found for EnvironmentName = 'DanApp-env'. remote: To https://AKIAJ2XDUJ2NAFXXXXXXXX: XXXXXXa9a9fe7e0fd7XXXXXXXXa94d
18%
Accelerated and targeted search and find with Ripgrep
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Andrew Tom on Unsplash
location, use -B <n>; -A <n> does the same thing for lines after the find. You can search compressed text archives with -z -a and a combination of options (Figure 6
18%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
the encryption or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256
18%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
module load openspeedshop-2.0.1 module load mvapich-1.1  (or other MPI implementation). If you run your application like this normally, mpirun –np 256 smg2000 –n 65 65 65  or this, srun -ppbatch -N 32
18%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
Py code, but just in case you have not, this quick example creates an “empty” 2D array of size nx by ny : import numpy as np nx = 10 ny = 10 a = np.empty((nx,ny)) type(a) Array a is of data type numpy
18%
The Staggering Costs of Technical Debt
23.05.2024
Home »  News  » 
 
New research from vFunction details the “staggering impact” of technical debt, reports Sean Michael Kerner. The Microservices, Monoliths, and the Battle Against $1.52 Trillion in Technical Debt
18%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
) 01/31/2013 _i686_ (1 CPU)01/31/2013 09:56:01 AM avg-cpu: %user %nice %system %iowait %steal %idle 14.78 0.38 3.47 2.16 0.00 79.21 Device: rrqm/s wrqm
18%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
.e., output all warnings) shows in Listing 4. Listing 3 Splint Warnings splint -strict example1.c Splint 3.1.2 --- 11 May 2019 example1.c: (in function main) example1.c:9:5: Format string

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 41 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice