Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (528)
  • Article (170)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 76 Next »

11%
Benchmarking a new architecture
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
  Quad-core Xuantie C910   64KB+64KB data/instruction caches per core   1MB shared L2 cache GPU 50GFLOPS BXM-4-64 NPU 4TOPS INT8 at 1GHz
11%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
; 22 my_record.z = counter + 2; 23 my_record.value = (float) counter * 10.0; 24 /* write out my_record */ 25 } 26 return 0; 27 } One-by-One Initially, I’m just going
11%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
with the original Raspberry Pi Model A, ranging from two to more than 250 nodes. That early 32-bit system had a single core running at 700MHz with 256MB of memory. You can build a cluster of five RPi3 nodes with 20
11%
Real-World HPC: Setting Up an HPC Cluster
04.11.2011
Home »  HPC  »  Articles  » 
on enterprise-grade rack hardware, there is no reason one cannot follow along at home with a few beige boxes and an 10Mb hub, as long as the servers are capable of booting from the network with PXE [6]. PXE
11%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
key RSA EIGamal DSA Cipher IDEA 3DES CAST5 Blowfish AES-128/-192/-256 Twofish Camellia-128/-192/-256 Hash MD5
11%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
provide useful information beyond how ioprof works. The benchmark I will use is IOzone. IOzone Example The ioprof test ran while I was running iozone three ways: (1) sequential write testing with 1MB
11%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :22
11%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
11%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
11%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 76 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice