Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (311)
  • Article (111)
  • News (9)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 44 Next »

18%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to 3DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
18%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
:Ethernet HWaddr 08:00:27:b0:21:7e inet addr:192.168.1.85 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::a00:27ff:feb0:217e/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU
18%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
> print(owner(j,1)); 1 julia> print(owner(j,2)); 1 julia> print(owner(j,5)); 3 julia> print(owner(j,7)); 4 Similarly, a processor can ask: “What is the range of my indexes?” julia> print(myindexes(j)); (1
18%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
been reached. The picture is similar with other Internet services: Almost everyone uses services such as email [3]. Both the service provider industry and hardware manufacturers need new markets: one
18%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
days, then you might be able to capture data about whether a node is alive or dead infrequently, perhaps every 5-15 minutes, or even longer if you like. Checking it once every 3 seconds seems a bit like
18%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
quark | CHANGED | rc=0 >> /dev/testlv 64.00 62.67 3% 4 1% /testfs Now, to create a playbook to remove the filesystem you just created, go to the /etc
18%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
as shown in Table 3, each gang will execute each loop redundantly (i.e., each gang will run the exact same code). These gangs are executed at the same time but independently of one another (Figure 2). Table
18%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
a user or group in Azure AD, use the cmdlet with the ObjectID parameter Get-AzureADUser -ObjectID 3b47a729-16c1-4be1-9ee2-7f3bd00a346b You can retrieve the ObjectID for each user after entering Get
18%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
the output. For example: nmap -sV --script exploit -d3 targethost NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define
18%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
, "created_at": "2024-05-17T10:00:00Z" } The corresponding BSON document would contain the following elements in binary code: A 32-bit integer for the length of the document A byte for the field types

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 44 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice