Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (552)
  • Article (207)
  • News (39)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 81 Next »

17%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
use Ubuntu 22.04, but you can apply all the advice to other distributions, too. ClamAV is used in conjunction with SpamAssassin as a tool for filtering mail. Where action relating to name servers
17%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
17%
Web Cryptography API
26.11.2013
Home »  Articles  » 
ability of web browsers to encrypt and decrypt application data using JavaScript, is currently under review by the World Wide Web consortium (W3C) as a draft. This promising technology reaches well beyond
17%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
if (ierr > 0) then 21 write(*,*) "error in opening file! Stopping" 22 stop 23 else 24 do 10 counter=1,counter_limit 25 my_record%x = counter 26 my_record%y = counter
17%
GUI or Text-Based Interface?
05.12.2018
Home »  HPC  »  Articles  » 
(Wikipedia, CC BY-SA 3.0). Another option is the Newt library, which focuses on color TUIs (Figure 2) and uses a widget approach, making programming a TUI much easier. With Newt, you can create stacked
17%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
Request timeout for icmp_seq 0 Request timeout for icmp_seq 1 Request timeout for icmp_seq 2 64 bytes from 52.90.56.122: icmp_seq=3 ttl=48 time=40.492 ms [ output truncated ] Welcome to Ubuntu 20.04.1 LTS
17%
Introducing parity declustering RAID
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Author, 123RF.com
/s, 133M issued at 133M/s, 81.6M total 0B repaired, 163.06% done, no estimated completion time scan: resilvered (draid1:3d:5c:1s-0) 20.2M in 00:00:00 with 0 errors on Mon Oct 24 17:11:22 2022
17%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
code is written and compiled in one of three classic HPC languages: Fortran [2], C++ [3], or C [4]. Why these languages? Because they have enabled generation of very efficient code for a long time
17%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
= sol.copy() 10 11 for j in range(0,ny-1): 12 sol[0,j] = 10.0 13 sol[nx-1,j] = 1.0 14 # end for 15 16 for i in range(0,nx-1): 17 sol[i,0] = 0.0 18 sol[i,ny-1] = 0.0 19 # end for 20 21 # Iterate 22
17%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
, and alerts are then sent by MQTT and stored in a SQLite database. The front end is a lightweight Flask app [3]. Figure 2: The honeyBot project flowchart

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 81 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice