Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 00 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (282)
  • Article (102)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 39 Next »

21%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
2P). Listing 2P: Python Code Example with Output in Loop (One-by-One) 1 #!/usr/bin/python 2 3 if __name__ == "__main__": 4 5 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0}; 6 7 counter
21%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
: all cores 0x40: core: this core 0x30: prefetch: all inclusive 0x10: prefetch: Hardware prefetch only 0x00: prefetch: exclude hardware prefetch 0x08: (M)ESI: Modified 0x04: M
21%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
Code 11111111112222222222 12345678901234567890123456789 ----------------------------- SUM = 0.0 D0 100 I=1,10 SUM = SUM + REAL(I) 100 CONTINUE ... Y = X1 + X2
21%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
21%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
::min((int) std::numeric_limits::max(), std::max(value, (int) std::numeric_limits::min())); 20 } 21  22 /** 23  * Convolve a grayscale image with a convolution  24  * kernel on the CPU. 25
21%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
-06| 4.75%| d = np.sqrt(d) 248| 12475000| 64.7463| 5.19008e-06| 3.89%| d2 = min(d, np.pi / 2.0) 249| 0| 0| 0| 0.00%| 250
21%
US Army’s Excalibur System Solves 10 Billion Equations in 3 Minutes
18.06.2015
Home »  HPC  »  News  » 
 
XC40 before the system is placed into regular service. The Excalibur system comes with 101,184 processors, and the Stanford team had access to 22,00 of them. The team was working on a new scalability ... US Army’s Excalibur System Solves 10 Billion Equations in 3 Minutes
21%
Creating an SFTP jail
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Juan Manuel Ordonez, 123RF.com
be replaced solely with the sshd configuration directives shown in Listing 3. Line 16 specifies that SFTP will listen on port 2202 instead of the default SSH port 22. This option is configurable and left ... 3
20%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st0.0; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24; 20 remote
20%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
can see how the arp cache poisoning works: $ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \ -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \ -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 39 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice