Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌推广seo【电报e1000】google优化收录.igb.0x00 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (109)
  • Article (25)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

81%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
known as row-major and column-major. Listing 2 column.go 01 package main 02 03 func main() { 04 05 const size = 10 06 07 var array = [size][size]int {{0},{0},} 08 09 for i := 0
81%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
! solution array 011 REAL(real8) :: tol=1.d-4, diff=1.0d0 012 REAL(real8) :: delta 013 REAL(real8) :: x 014 REAL(real8) :: pi 015 REAL(real8) :: exact 016 REAL(real8) :: pdiff 017 REAL(real4
81%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
Switch(config)# dot1x system-auth-control 06 Switch(config)# radius-server host 10.1.1.1 key V@rYseCre!t 07 Switch(config)# interface fastethernet0/1 08 Switch(config-if)# switchport mode access 09 Switch ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X
81%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
on the options you chose, but some sample output is shown in Listing 1. Listing 1: Sample iostat Output [laytonj@home8 IOSTAT]$ iostat -c -d -x -t -m /dev/md1 2 100 Linux 2.6.18-308.16.1.el5.centos.plus (home8
80%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/share/doc/kernel-doc/Documentation/networking/bonding.txt ). Listing 5 ifcfg-bond0 01 DEVICE=bond0 02 IPADDR=192.168.10.200 03 NETMASK=255.255.255.0 04 ONBOOT=yes 05 USERCTL=no 06 BONDING_OPTS="mode=1 miimon=100" When the system is running, the /proc ... 0
80%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
this happened by watching the file /etc/group , which is one of the files I imported into the Warewulf database. Before rebooting the compute node, the file looks like this: -bash-4.1# more /etc/group root:x:0
80%
Introduction to OpenMP programming
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Frank Rohde, 123RF.com
)*dexp(-pi) 098 ENDDO 099 100 ! Bottom of unit square: (S) 101 DO i=1,m 102 x=delta*i 103 u(i,1) = dsin(pi*x) 104 ENDDO 105 106 ! Right hand side of unit square: (E) 107 DO j=1,m 108 u(m,j) = 0.0d0 109
80%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
can refer to the entire process environment by means of the **environ variable; therefore: (gdb) p &environ $4 = ( *) 0xf7f83d64 (gdb) x/100s *environ 0xffffc815
80%
Building a virtual NVMe drive
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © lassedesignen, 123RF
with the blockdev utility: $ sudo blockdev --getsize64 /dev/sdb 7000259821568 Listing 1 Server Drives 01 $ cat /proc/partitions 02 major minor #blocks name 03 04 7 0 91228 loop0 05
79%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
]) 03 guesses: 0 time: 0:00:00:01 100% c/s: 9433 trying: hken1900 Finally, the brute force attack might be your only refuge if passwords are more complex. The sub-modes allow you to specify which

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice