Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (592)
  • Article (181)
  • News (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 80 Next »

17%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
in the Fortran programfor a longer run time: nx = 8000 ny = 8000 i t_max = 10000 tolerance = 0.00004D+00 The code was compiled using GCC 7.1 and run on a four-core AMD A6-6310 laptop (Lenovo
17%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
the first real-time Quantum Application Environment called Leap [6]. "We built Leap based on our experience helping customers build the 100 early real-world applications running on our computers today. So, we
17%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
for those cities (Figure 6). Figure 6: Simulated flight results on the BlazeMeter website. Pressing a specific button for a flight confirms what you have
17%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
to the instance. For example, for the network in Figure 5, VLAN 101 to 150 can be grouped into instance 1 and VLAN 151 to 200 can be grouped into instance 2 (Figure 6). The total number of network topologies
17%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
packages, whereas a Debian developer (DD) as a Debian member can upload any package. Fedora As soon as work starts on a new version of Fedora, the developers create a new GnuPG key [6] and use it to sign
17%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
of the memory: dd if=/dev/fmem of=memory.dd bs=1MB count=512 Another tool for dumping memory is the kernel module crash , which was developed by Red Hat. Just like fmem , crash creates a pseudodevice called
17%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
is not a lightweight, but you can get a lightweight version that lacks a graphical interface and weighs in at 900MB, which can be quite useful in everyday Kali life. Accordingly, the developers give their users a choice
17%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
then Create New Users ; name the user whatever you would like and click C reate (Figure 6). Figure 6: Creating a new user. Once the user is created, go
17%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
Hat’s own OpenStack distribution, RDO. Kickstack, in turn, is more concerned with the classic Ubuntu environment running Ubuntu LTS version 12.04. Until one of the two tools is extended to support other
17%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
:\mount\Windows\Windows\System32\Recovery\winre.wim 07 08 move C:\mount\Windows\Windows\System32\Recovery\winre.wim C:\Temp\winre.wim 09 10 Dism /Optimize-Image /Image:C:\mount\Windows /WIMBoot 11 12 Dism /Unmount-Image /Mount

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice