Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (859)
  • Article (204)
  • News (99)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 117 Next »

9%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
: 09 Content-Type: application/sdp 10 Content-Length: 142 11 12 v=0 13 o=alice 53655765 2353687637 IN IP4 pc33.atlanta.com 14 s=- 15 t=0 0 16 c=IN IP4 pc33.atlanta.com 17
9%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
.org packetstormsecurity.org,199.58.210.12,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.12,MX,10 Fierce [2], written
9%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
"creating" $vmname 09 10 virsh suspend rhstorage 11 virt-clone -o rhstorage -n $vmname -f /var/lib/libvirt/images/$vmname.qcow 12 virsh resume rhstorage 13 14 oldmac="52:54:00:B4:DF:EB" 15 newmac
9%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
on the programming model and compiler in use, these optimizations are so well understood as to carry their own names. Loopy David Spuler's recent works [1][2] feature the taxonomy of loop manipulation strategies
9%
Sharing Data with SSHFS
23.04.2014
Home »  HPC  »  Articles  » 
.5 FUSE library version: 2.8.3 fusermount version: 2.8.3 using FUSE kernel interface version 7.12 to make sure everything is installed correctly. Testing SSHFS with Linux Now that SSHFS is installed
9%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
9%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
its details and overview, as shown in Figure 12. Figure 12: Viewing a Linux system’s details (page 1 of 2). Figure 13 is a display of the available
9%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de6a188aa344e12UU 9521003ac756abbdf
9%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
("10.0.0.1",9009,4,IOStream(),IOStream(),{}, {},2,false) ... },{Location("",0), Location("10.0.0.1",9009) ... Location("10.0.0.12",9009)},4, {(1,0)=>Work
9%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
 to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start_time)   print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 117 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice