Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 201 Next »

18%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
|         0|            0|            0|  0.00%|# md test code      2|         0|            0|            0|  0.00%|      3|         2|  3.50475e-05|  1.75238e-05|  0.00%|import platform      4|         1|  2.19345e-05|  2.19345e-05|  0.00%|from
18%
Autoconfiguring IPv6 Clients
30.03.2012
Home »  Articles  » 
 
The routing and addressing problem is nothing new in the IPv4 world. Version 6 of the Internet Protocol (IP), which is no spring chicken itself
18%
Network performance in the world's favorite data center
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Lucy Baldwin, 123RF.com
--instance-type m6in.2xlarge --count 2 --output text Table 1 Network Performance Factors* Enhanced networking [4]   SR-IOV [5] and better hardware Elastic network adapter
18%
Arch Linux, packaged in style
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © kaewkanya sompong, 123RF.com
expect, the text-based installer of Arch Linux is not there to greet you when trying to install the system. Instead, the installer framework Calamares (Figure 1) is used in the current version 2.4
18%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © archibald1221, 123RF.com
executes the payload and a TCP session is created, connecting back to the listener. 2. Read a 4-byte length, indicating the .dll size and then transfer the .dll. 3. Allocate a (length-byte+5) buffer; mark
18%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
take both a host-based and network-based approach. The suite uses three tools for host-based intrusion detection: (1) Wazuh [3] is a fork of the OSSEC [4] intrusion detection system; it monitors hosts
18%
Open MPI
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
, and available man pages, respectively." puts stderr "" puts stderr "This was built using the default gnu compilers for Scientific" puts stderr "Linux 6.2. That is, gcc-4.4.6-3." puts stderr "" puts
18%
Pymp – OpenMP-like Python Programming
15.04.2020
Home »  HPC  »  Articles  » 
  #pragma omp parallel { ...} #pragma end parallel From the website, example code might look like: with pymp.Parallel(4) as p:   for sec_idx in p.xrange(4):     if sec_idx == 0:       p
18%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
Installing Dockly with the npm JavaScript package manager [4] is clear and straightforward. If npm is not available on your local machine, you can install it with the command (for my Linux Mint 19 laptop
18%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
-Ready" box). The application will be exposed on port 8080 and will use an ad hoc Postgres instance for its data and configuration storage (Listing 1). Listing 1 Deploying Keycloak 01 version: '2.4

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice