Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (133)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 59 Next »

14%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
wrote on Lmod back in 2018, you will see a discussion about the three commands to run: $ sudo ln -s /usr/local/lmod/lmod/init/profile /etc/profile.d/z00_lmod.sh $ sudo ln -s /usr
14%
Dolphin Announces New Switch for Composable Architectures
10.01.2019
Home »  HPC  »  News  » 
 
various configurations, where up to 4 ports can be combined into a single x16 / 128 GT/s port for higher bandwidth. Ports can be configured as 24 x4 ports, 12 x8 ports, 6 x16 ports, and various
14%
Building sustainably safe containers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © it studiom1, 123RF.com
.matrix.dev/gentoo-java:latest-amd64 . && touch buildtime && docker push dockerrepo.matrix.dev/gentoo-java:latest-amd64 && touch pushtime Sending build context to Docker daemon 66.12MB Step 1/6 : FROM dockerrepo
14%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn
14%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
6 > db_nmap -v -sV 192.168.122.0/24 (...) [*] Nmap: Nmap done: 256 IP addresses (4 hosts up) scanned in 66.64 seconds msf6 > hosts Hosts ===== address mac name os_name os
14%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
-enabled as the first statement of the setup parameter with gc.enable(). Heisenberg's Law Heisenberg's law of profiling [6] holds that measuring a computing system alters it. How am I altering the system
14%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
at the output of uptime [1] on OS X: 13:03 up 2 days, 12:01, 2 users, load averages: 0.52 0.59 0.63 The uptime command displays the load average in its common form, averaging the last one, five, and 15 minutes
14%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
) [application/octet-stream] Saving to: Rocky-8.6-x86_64-dvd1.iso   Rocky-8.6-x86_64-dvd1.iso     35%[===========>                         ]   3.74G  37.4MB/s    eta 2m 45s When you reconnected to the session, you didn’t specify
14%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
(unew(i,j)-u(i,j)) ) 141 ENDDO 142 ENDDO 143 144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew
14%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
-provisioned, and network-based , as delivered by the Elastic Block Storage service (EBS). EBS volumes are highly available and come with a multitude of options too large to detail here [6]. In broad strokes, EBS volumes

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 59 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice