Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (587)
  • Article (195)
  • News (14)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 80 Next »

26%
Udev with virtual machines
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © orangeline, 123RF.com
distributions. Table 1 Udev Storage Locations Distribution Path Ubuntu 12.10, Debian 7.0, SLES 11 SP2 * /etc/udev/rules.d/70-persistent-net.rules* /lib/udev/rules.d/75
26%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl" collections
26%
Container Apps
02.10.2017
Home »  Articles  » 
 
  hello  snapcraft.yaml  wifi-ap   name: my-snap-name # you probably want to 'snapcraft register ' version: '0.1' # just for humans, typically '1.2+git' or '1.3.2' summary: Single-line elevator pitch for your amazing snap # 79 char
26%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
://analyticsacademy.withgoogle.com/course02/assets/html/GoogleAnalyticsAcademy-PlatformPrinciples-Lesson1.2-TextLesson.html NetFlow Export Datagram Formats: http://www.cisco.com/c/en/us/td/docs/net_mgmt/netflow_collection_engine/5-0-3/user
26%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
of the loop, n , is large enough, some processing hardware can greatly speed up the computation. What happens if z(i)  depends on a previous value, as in the following: do i = 2,n    z(i) = z(i-1)*2 enddo
26%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
26%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
translates into a huge address that it is undoubtedly out of the process address space. The following line computes this address using the GNU Project debugger (gdb): (gdb) printf "0x%x\n",(j-i)+&vacf 0xd
26%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
Interfaces: 12 - DeviceIndex: 0 13 NetworkInterfaceId: 14 Ref: fgteni1 15 - DeviceIndex: 1 16 NetworkInterfaceId: 17 Ref: fgteni2 18 UserData: 19
26%
Elastic Beanstalk
29.10.2013
Home »  Articles  » 
 
-stack-AWSEBAutoScalingGroup-12BAR59E5FUDM: policyName/awseb-e-mnpsy5bpzk-stack- AWSEBAutoScalingScaleDownPolicy-KW4NGGQ0LULU 2013-05-08 20:07:48 INFO Created CloudWatch alarm named: awseb-e-mnpsy5bpzk
26%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice