Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1175)
  • Article (302)
  • News (181)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 167 Next »

16%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
: Stream Benchmarks   Name Kernel Bytes/Iteration FLOPS/Iteration COPY a(i) = b(i) 16 0 SCALE a(i) = q*b(i) 16 1 SUM
16%
PowerTOP
21.10.2011
Home »  Articles  » 
 
.6.21, and a 64-bit kernel will need at least version 2.6.23. To check your system, you can enter the command: uname ‑r You’ll be on the safe side as of openSUSE 11.0 and Ubuntu 8.04. Additionally, your kernel
16%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
.168.1.129 -p 3260 specifying that the target Windows computer with the Subject USB stick is at 192.168.1.129 and listening on port 3260. The system connects to targets iqn.2008-02.com.f-response.cr0wn-d00
16%
BackTrack 5 R2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
of Maltego, version 4.2.0 of the Metasploit exploit framework (Community Edition), an update of the Browser Exploitation Framework (BeEF), and version 3.0 of the Social-Engineer Toolkit (SET). Other new tools
16%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© 2012 Apple Inc.
lockdown: iOS 5: handle 'Error' key in lockdown_check_result 03 d2db9b97b0487e3e0c65cca0e0dd02a747a61113 Fix memory leak in idevice_device_list_free 04 d51431edc3987cb9e595fdec874cdf869935d21d idevicebackup2
16%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
a new user and log in to get a terminal: net user cr0wn password /ADD In this example, I have added the user cr0wn to the windows account with the password password . Something to consider when doing
16%
Backup and restore disks
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Omar Flores on Unsplash
capacity for the backup. At the time of my tests, the current version was 1.0.6. For upcoming version 1.0.7, the developer announced stable support for backing up individual partitions. This feature
16%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
the CPU with floating-point arithmetic while exercising its caches and the system's memory: stress-ng --matrix 0 -t 1m --tz --times The zero count syntax requests one stressor to run on each CPU
16%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
of alternative sources. Listing 1 sensors Output federico@ferenginar:~$ sensors k10temp-pci-00c3 Adapter: PCI adapter temp1: +42.5¡C (high = +70.0¡C) (crit = +100.0¡C
16%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
; in Listing 3, the bridge device is then configured with its IP address and other parameters. Listing 2 Network Configuration (1) [Match] Name=enp2s25 [Network] Bridge=docker0 Listing 3

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 167 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice