Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 12!490 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (116)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60

9%
High-Performance Python 3
19.09.2019
Home »  HPC  »  Articles  » 
 = np.array([10, 20, 30, 40])   print('a+b:\n', add_ufunc(a, b)) The answer should be: a+b:  [11 22 33 44] In the previous example, you had to put everything that was to run on the GPU into a single Numba
9%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
.0.1 20240412 (experimental) [master r14-9935-g67e1433a94f] (Ubuntu 14-20240412-0ubuntu1)  Everything looks good: mpirun  is there and mpicc  points to gcc-14.0.1 (the host system is Ubuntu 22.04, for which gcc-14 does
9%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 info ruby # Needs to be v2.2+ $ curl -sSL https://rvm.io/mpapis.asc | gpg --import - # From here see https://tecadmin.net/install-ruby-latest-stable-centos $ curl -L get.rvm.io | bash -s stable $ source
9%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
# and network has converged traceroute -In 10.4.1.25 1 10.3.1.22 # backup VPN # router site 3 2 172.16.1.7 # backup VPN # router site 4 3 10.4.1.25 LAN Failure
9%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
grants permissions to enable GuardDuty. If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
9%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
: "routers", "value": "192.168.2.254" }], "reservations": [{ "hw-address": "00:11:22:33:44:55", "ip-address": "192.168.2.60", hostname: "host-2-60" }, { "hw-address": "00
9%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
capture or display filters. The capture filter would look like this: port 22 Then start capturing, initiate an SSH login at the console, and in the Analyze menu, select Follow TCP Stream . The result
9%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
to popular ports, such as 80 (HTTP) or 22 (SSH), and pings. If Portbunny does not register a response to a port request, but the trigger packet reaches the target, it tags the port as filtered. Using Portbunny
9%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
16 into offset hole 22, your new furniture might never live up to your expectations. Additionally, integrating the furniture into an existing room could be a challenge. Forgetting that the new surround

« Previous 1 ... 53 54 55 56 57 58 59 60

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice