Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00 Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (227)
  • Article (98)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

26%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
to create the hex string that Solaris expects as the PSK from the password of test123 . I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication
26%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
26%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
:Ethernet HWaddr 08:00:27:b0:21:7e inet addr:192.168.1.85 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::a00:27ff:feb0:217e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU
26%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
> print(owner(j,1)); 1 julia> print(owner(j,2)); 1 julia> print(owner(j,5)); 3 julia> print(owner(j,7)); 4 Similarly, a processor can ask: “What is the range of my indexes?” julia> print(myindexes(j)); (1
26%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
been reached. The picture is similar with other Internet services: Almost everyone uses services such as email [3]. Both the service provider industry and hardware manufacturers need new markets: one
26%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
days, then you might be able to capture data about whether a node is alive or dead infrequently, perhaps every 5-15 minutes, or even longer if you like. Checking it once every 3 seconds seems a bit like
26%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
quark | CHANGED | rc=0 >> /dev/testlv 64.00 62.67 3% 4 1% /testfs Now, to create a playbook to remove the filesystem you just created, go to the /etc
26%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
as shown in Table 3, each gang will execute each loop redundantly (i.e., each gang will run the exact same code). These gangs are executed at the same time but independently of one another (Figure 2). Table
26%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
a user or group in Azure AD, use the cmdlet with the ObjectID parameter Get-AzureADUser -ObjectID 3b47a729-16c1-4be1-9ee2-7f3bd00a346b You can retrieve the ObjectID for each user after entering Get
26%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
the output. For example: nmap -sV --script exploit -d3 targethost NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice