Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub%253%25390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (602)
  • Article (172)
  • News (35)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 82 Next »

19%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
a(i) = b(i) + c(i) 24 1 TRIAD a(i) = b(i) + q*c(i) 24 2   The Copy benchmark measures the transfer rate in the absence of arithmetic. This should
19%
John the Ripper
22.08.2011
Home »  Articles  » 
 
:lanman passfile.txt Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2 guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
19%
Data center networking with OpenSwitch
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © higyou, 123RF.com
network operating system in cooperation with Accton Technology Corporation, Arista, Broadcom, Intel, and VMware. The series of Altoline switches [3] by HP Enterprise (HPE), as the group is now called, were
19%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj) Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection ... 25
19%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
.site_container}", 17 ] 18 connection { 19 type = "ssh" 20 user = "root" 21 private_key = "${file("${var.ssh_priv_key}")}" 22 } 23 } 24 } 25 output "IP" { 26 value
19%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
64ae120c27e504088d8c2ce29a0fa7f85c The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
19%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
| swift | object-store | | aef9ec430ac2403f88477afed1880697 | aodh | alarming | | b0d402a9ed0c4c54ae9d949e32e8527f | neutron | network | | b3d1ed21ca384878b5821074c4e0fafe
19%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system
19%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
), infrastructure-as-code (IaC) misconfigurations, and sensitive information and passwords. Installation Trivy can be installed on all popular Linux distributions and macOS. Alternatively, you can run Trivy
19%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
="walk" value="true"/> 22 23 24 25

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 82 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice