Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (555)
  • Article (162)
  • News (15)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 74 Next »

16%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
in the Fortran programfor a longer run time: nx = 8000 ny = 8000 i t_max = 10000 tolerance = 0.00004D+00 The code was compiled using GCC 7.1 and run on a four-core AMD A6-6310 laptop (Lenovo
16%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
library mpiP [3], is used in conjunction with one of these two MPI libraries to gather MPI profile stats. When Remora is finished, it creates a directory of form remora_XXX in the directory in which
16%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
(Figure 2). Once the installation is complete, type bash to display the prompt (Figure 1, bottom). Like all applications under Windows, the bash shell shown in Figure 3 is launched from the Start menu
16%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
-a9c7-1c7ef74a9ba4 Blocks the use of copied or imitated system tools (preview) No c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb Blocks web shell creation for servers
16%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
16%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
a great deal of power in a few lines: rm -rf backup.3 mv backup.2 backup.3 mv backup.1 backup.2 cp -al backup.0 backup.1 rsync -a --delete source_directory/ backup.0/ To better understand the script, I
16%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
. Amdahl’s Law says the speedup is 1.00 (i.e., the starting point). Notice that as the number of processors increases, the wall clock time of the parallel portion decreases. The speedup a increases from 1.00
16%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing 3 shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.22
16%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
, so you can continue. Listing 7 Starting sshd $ systemctl start sshd $ lsof -i :22 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sshd 5122 root 3u IPv4 62113 0t0
16%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
cloud offerings from Red Hat. Gears and Cartridges Like other PaaS technologies, OpenShift is generally focused on web development. Only Ports 22, 80, 443, 8000, and 8443 are available from the outside

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 74 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice