Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (674)
  • Article (203)
  • News (99)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 98 Next »

14%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
-ring encapsulation (1 bit), and identification of the respective VLAN identifier (12 bits). A maximum of 4,096 VLANs can be set up with the 12 bits of the VID (VLAN identifier) field. Tagged VLANs differ from
14%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
as shown in the following listing. Apache/2.2.16 (Debian) DAV/2 SVN/1.6.12 mod_fcgid/2.3.6 Phusion_Passenger/3.0.11 mod_ssl/2.2.16 OpenSSL/0.9.8o Server at www.domain.tld Port 80 Treacherous Error Messages
14%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
(unew(i,j)-u(i,j)) ) 141 ENDDO 142 ENDDO 143 144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew
14%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
/07/2014 12:38.21 :: MetricLineReceiver connection with 192.168.56.1:52981 established in the logfile /var/log/carbon/listener.log . If not, an error message may point you to a malformed line. If you have
14%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
available software program is listed here but these three are worth further exploration. I personally have experience with all three of these systems and have used them over the past 12 years in large complex
14%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
shown in Figure 4. Figure 4: Header bytes 12-15. Looking at byte 13, if SYN and ACK are set, then your binary value would be 00010010 , which
14%
Julia: A New Language For Technical Computing
31.05.2012
Home »  HPC  »  Articles  » 
_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8.64 41.79 Table 1: Benchmark Times
14%
Exploring the Linux Tuning Guide for AMD Opteron 6200 Series Processors
16.07.2012
Home »  HPC  »  Articles  » 
cache.” Other resources, such as a floating-point unit, are shared between the two cores within the same module. The AMD Opteron 6200 Series processors come in 4-, 8-, 12-, and 16-core models. The 16
14%
Pen Test Tips
30.04.2012
Home »  Articles  » 
 
-attacks. Day 4 includes a 12-hour exercise where participants are attacking (Red Team) or defending (Blue Team). I was on the red team, and having the ability to throw meterpreter shells to my fellow red team
14%
Symbolic Mathematics with Python's SymPy Library
17.10.2018
Home »  HPC  »  Articles  » 
, you will find an interesting introduction to the Python language for science and engineering in Chapter 12 (dedicated to SymPy) of the online book Python for Computational Science and Engineering . Also

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice