Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (26)
Keywords

« Previous 1 2 3 Next »

47%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
47%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
for the VPN. Listing 9 shows you the setup for this combination. Listing 9 Juniper Configuration, Phase 2 01 security { 02 IPsec { 03 proposal aes256-sha1 { 04 protocol esp; 05
47%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
47%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
the passphrase as the real key; don't use a hash algorithm. For example: losetup -e aes -k 256 -N /dev/loop0 partition.img If your distribution uses a special derivate of losetup from the loop-aes package
47%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
filesystem, if so desired [5]: $ guestfish -N fs:ext3 When you call Guestfish with the new image, $ guestfish -a you are taken to a shell where you first need to enter run to toggle the system ... 9 ... 2012
46%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
can exclude files of a certain size (e.g., those of 0MB). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size = 0 Mb ... 2012
46%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
.168.209.200 07 192.168.209.200:3260,1 iqn.1986-03.com.sun:02:8f4cd1fa-b81d-c42b-c008-a70649501262 08 # iscsiadm -m node 09 # /etc/init.d/open-iscsi restart 10 # fdisk -l 11 Disk /dev/sdb: 2147 MB, 2147418112 bytes
46%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
julia> limulus limulus limulus limulus n2 n0 n2 n0 To get a better feel for parallel computation, I can run the example from the Julia documentation [9]. First, see how it works on one node ... 2012
46%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
lacks support for SSH access and access to the hard disks' S.M.A.R.T data. Thecus N6850 We imported the Thecus N6850 from its vendor in the Far East, but you can buy it directly from dealers. What you ... 2012
46%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache. I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice