Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 229 Next »

12%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
to your command. When you receive the expected response, you enter another command and so on. Expect works in the same way, except you have to provide the script with commands and expected responses
12%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
Kit is the polkitd daemon. Because it only needs to respond to requests from system tools, it runs on a restricted account. Therefore no one can use it to hijack the system. polkitd provides its functions via the D
12%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
); and DSPs (digital signal processors) have risen in popularity. These accelerators have the potential to provide much better performance in applications and algorithms that can take advantage of them compared
12%
The Meson Build System
16.07.2014
Home »  HPC  »  Articles  » 
. Meson does not support IDEs yet, but the build system provides an API that any developer can use to integrate Meson into their favorite IDE. A simple GUI is in its infancy (Figure 4). If you want
12%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
files and directories outside home directory might provide a means for escalating privileges. Metasploitable revealed 1070 such entries. Among these writable files and directories, two directories
12%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
(Secure Shell). SSH is the secure equivalent of the old Telnet application; it provides an interactive shell session on the remote system from which you can work at the command line. Also, you can direct
12%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
, was becoming popular. It provided a way to utilize other processors in the same system or processors on other systems. Additionally, OpenMP was released, providing a threading model for applications
12%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
, gfortran provides coarray functionality from Fortran 2008 starting with version 5.1. It uses the coarray capability in OpenCoarrays. The compiler translates the coarray syntax into library calls
12%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
 modprobe nvmet-tcp The NVMe target tree will need to be made available over the kernel user configuration filesystem to provide access to the entire NVMe target configuration environment. To begin, mount the kernel user
12%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
Containers provide reproducible, portable applications. In a sense, they are an evolution of virtual machines (VMs), but without the entire operating system (OS). Therefore, containers are a bit

« Previous 1 ... 186 187 188 189 190 191 192 193 194 195 196 197 198 199 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice