Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (911)
  • Article (213)
  • News (112)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 124 Next »

9%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses. According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent
9%
Real-time log inspection
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © bowie15, 123RF
(Listing 4). Listing 4 JSON Output $ teler -i apache.log -c teler.yml --json /","status":"200","time_local":"07/Nov/2020:22:45:20 +0000"} {"body_bytes_sent":"5695","category":"Bad Crawler
9%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
: /lib/modules/4.20.5-200.fc29.x86_64/kernel/net/netfilter/nf_tables.ko.xz alias: nfnetlink-subsys-10 author: Patrick McHardy license: GPL depends
9%
Parallel Python with Joblib
08.04.2014
Home »  HPC  »  Articles  » 
| elapsed: 0.0s remaining: 4.5s [Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s [Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
9%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real
9%
What's Ahead for OpenMP?
05.12.2011
Home »  HPC  »  Articles  » 
’s Supercomputing Conference (SC12) in Salt Lake City. We will be at the International Supercomputing Conference in Hamburg, Germany, at the RWTH Aachen booth. Readers can get involved by petitioning their companies
9%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
          firstname=v 12       elseif k=='lastname' then 13          lastname=v 14       end 15    end 16  17    r:puts(string.format("Hello %s %s!", firstname, lastname)) 18  19    r:puts("") 20 end
9%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
, elements of the distributed array, j (created above) can be changed (not just the local references; in this case, rows 1-2 and columns 1-8): julia> j[2,2]=0; julia> j[8,8]=0; julia> print(j); 8x8 Float
9%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
, 6 ) / ( 4, 6 ) }       DATA {          1, 2, 3, 4, 5, 6,          7, 8, 9, 10, 11, 12,          13, 14, 15, 16, 17, 18,          19, 20, 21, 22, 23, 24       }    } } } HDF5 has many ways to represent the same datatype
9%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
time. It also lists the directory with the Remora output. Listing 1: poisson_serial.f90 Output [laytonjb@laytonjb REMORA_TEST]$ remora ./poisson_serial 23 August 2017   7:12:50.609 PM    POISSON

« Previous 1 ... 85 86 87 88 89 90 91 92 93 94 95 96 97 98 ... 124 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice