Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1595)
  • Article (348)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 204 205 206 207 208 209 210 211 212 213 214 215 216 Next »

18%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
that lend themselves to parallelizing with directives. You can parallelize each loop individually (Table 2), giving you more control, or you can combine loop directives into a single directive (Table 3
18%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 -n # , where #  is the number of threads and a space falls between it and the switch (Listing 3). Listing 3: lbzip2 $ lbzip2 -v -n 4 package-list.txt lbzip2: compressing
18%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
© jeancliclac, Fotolia.com
’s URL, which would be the following, if you’re browsing it from the server itself: https://localhost/cookbooks You’ll see the Chef Server default page, as shown in Figure 3
18%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
tuning options, and (3) NFS management/policy options (Table 1). In the sections that follow, these options are presented and discussed. Table 1 Tuning Options NFS Performance Tuning
18%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
of the entire dynamic state (Figure 3). This method, in effect, resets the window of vulnerability from boot time to the time of the most recent measurement
18%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
Linux VMs, providing more granular control. It's also important to audit and update NSG rules regularly (Figure 3) to ensure they remain aligned with your security policies and the evolving threat
18%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
or a password, and the current user will be allowed to run remote commands as root using ssh. This script is called ec2_ssh_init, and Listing 3 shows its initial section. Listing 3 ec2_ssh_init (Part
18%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
(Listing 3). Listing 3 Error Message on Web Server Restart 01 # /etc/init.d/httpd start 02 Starting httpd: Syntax error on line 281 of httpd.conf: 03 DocumentRoot must be a directory 04
18%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them
18%
Parallel Versions of Familiar Serial Tools
28.08.2013
Home »  HPC  »  Articles  » 
-core run of Pigz and Pbzip2 on a 1.1GB file (the test was done in 2011). He found that he got a 3.5 times speedup using four cores compared with a single core (pretty good scaling). However, don’t always

« Previous 1 ... 204 205 206 207 208 209 210 211 212 213 214 215 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice