Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (300)
  • Article (109)
  • News (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 43 Next »

22%
HTML to database with a Perl script
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Danila Krylov, 123RF.com
for the categories representing the language that was identified in the menu iframe. Listing 1 HTML iframes 01 02 03
22%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
. Further details for each change follow this summary. If you automate the use of AIDE, you will definitely need to evaluate the program's return values. Like (virtually) any application, a return value of 0
22%
Programming with OpenMP
07.11.2011
Home »  HPC  »  Articles  » 
. Figure 1: By default, top shows the total load for all CPUs … The program seems to be using 100 percent of the CPU. But appearances can be deceptive: The computer’s actual load is just 60 percent
22%
The Road to End-of-Scale
19.06.2013
Home »  HPC  »  Articles  » 
.. 
Figure 1: CPU clock frequency over time (CC BY-SA 3.0 US). Of course, you know the reason: Higher clocks, and thus temperatures, were not sustainable. That is not to say clock rates will not increase
22%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
with an Ethertype of 0x88e5 on the provider's network. Because MACsec works on Layer 2, it must be individually enabled for each interface. Encryption Method MACsec uses AES-GCM as the encryption algorithm
22%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, “Hypertext Transfer Protocol,” which was finally standardized as HTTP 1.0 in May 1996. Just three years later, HTTP 1.1 was standardized to reflect the increasing load on the web. The revised protocol reduced
22%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
has announced the OCI v1.0.0 run time and image specifications. OCI is a cross-industry initiative to standardize technologies around Linux containers. Essentially, OCI seems to achieve the same goals
22%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
the following code admin.c: #include int main(int argc, char **argv) { printf("Hello World!"); return 0; } You can compile the source code with: gcc -O0 admin.c -o admin The -O0 entry switches off
22%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
, a is the application speedup, n is the number of processors, and p is the “parallel fraction” of the application (i.e., the fraction of the application that is parallelizable), ranging from 0 to 1. Equations are nice
22%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
: In Equation 1, a is the application speedup, n is the number of processors, and p is the "parallel fraction" of the application (i.e., the fraction of the application that is parallelizable), ranging from 0

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice