Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (751)
  • Article (181)
  • News (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 96 Next »

16%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
as filter the many thousands of processes running on any particular Windows host. You can download Process Monitor directly from Microsoft [6]. Figure 1
16%
Selecting Compilers for a Supercomputer
21.12.2017
Home »  HPC  »  Articles  » 
, built by IBM at a cost of around EUR135 million, has 19 compute islands with approximately 8,200 cores each, and six newer islands with 14,300 cores each. It achieves a speed of around 6 petaFLOPS (10
16%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
in turn enables orchestration. Version 1.2.5a Swordfish from June 2023 (version 1.2.6 since January 22, 2024) delivers an extension of the DMTF (formerly known as the Distributed Management Task Force
16%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
of the overflow mechanism. Up to six (6) hardware counter events are read when a sample is taken. hwctime High user CPU time Similar to hwc experiment, except that callstack sampling is used
16%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [6]; each plain text file ends with the .attack extension. Listing
16%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Photo by Zachary Young on Unsplash
as Python modules with tools such as SWIG [6], Pyfort [7], and F2PY [8]. Writing parallel functions in Python is very difficult, but it's fairly straightforward in C and Fortran with the use of a variety
16%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
msstore Search repo(s) for matching packages by nameLimit search to a particular package source list ls winget listwinget list - n 12winget list --upgrade-availablewinget list
16%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
integrate existing data sources that are accessible via SMB/CIFS or Novell Core Protocol (NCP), for example, on Windows 2003/2008, Novell Open Enterprise 11 (OES), and NetWare 6.5.8 servers with at least one
16%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
------- ------ ----- ----- ----- ------ -- ----------- 03 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 04 74 9 1464 2568 42 0.09 2172 armsvc 05 195 10 2380 2984 62 0
16%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception

« Previous 1 ... 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice