Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (922)
  • Article (319)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 135 Next »

17%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port
17%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
, password = "Secret", user = user 0.000u 0.000s 0:39.71 0.0% 0+0k 0+0io 0pf+0w or # hdparm --user-master u --security-erase-enhanced "Secret" /dev/sdb In both cases, not only is the delete process
17%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8.64 41.79 Table 1: Benchmark Times
17%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
, it’s very easy to get laptops with at least two, if not four, cores. Desktops can easily have eight cores with lots of memory. You can also get x86 servers with 64 cores that access all of the memory
17%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
the output. For example: nmap -sV --script exploit -d3 targethost NSE scripts have a clear-cut structure. This becomes most clear when you take a look at an existing script. The scripts not only define
17%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
with the letters DAL , issue the command (in Cygwin): bash-3.2$ net view | grep -i DAL \\DAL01 \\DAL02 \\DALAUTO \\DALV01 The only thing you have to remember when dealing with Windows systems in Cygwin’s Bash
17%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
on xinetd to start, which in turn means having a suitable configuration file stored in the /etc/xinetd.d directory (Listing 3). Listing 3 SWAT Configuration service swat { port = 901
17%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
is an interpreted language that is "powerful, fast, lightweight" [2]. It is probably most well known as the scripting language used by the popular game World of Warcraft (WoW) [3]; however, Lua is also used
17%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
for AWS APIs; therefore, Eucalyptus clouds can scale out to Amazon EC2. Eucalyptus also implements an Amazon S3-compliant storage component called Walrus. Walrus is primarily a virtual machine repository
17%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, you can quickly become confused when you hear about K3s [2], k0s [3], minikube [4], Microkubes [5], and the many other variants. These names relate to K8s distributions, all of which enrich the vanilla

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 135 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice