Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (311)
  • Article (9)
  • News (7)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 33 Next »

18%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
18%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
crack attempt using the supplied password list file, password.lst. This list contains more than 3,000 commonly used passwords (Listing 2). Listing 2 Cracking with the Password List File 01
18%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
, the problem of writing a dump to an MD RAID or transferring larger kernel images ultimately proved unfixable. Further attempts with Netdump (Red Hat) or Diskdump [3] in 2002 and 2004 also had only moderate
18%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
data. 3. The data server now opens a direct connection to the tape server and sends a stream of backup data via the connection. The logs on both sides and transferred file history are sent
18%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator
18%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
experience [2]. A good tool for cache control is vmtouch [3], which is at home on most Linux 2.6, FreeBSD 7.x, or Solaris 10 kernels; mileage may vary on other *nix variants. Expect partial functionality
18%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
/init for event conditions that cannot be fulfilled – that is, the jobs would never start or stop of their own accord. These two commands were introduced in their current form in Upstart version 1.3, which in turn
18%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
[2] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.0 release [3
18%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
opcontrol --list-events oprofile: available events for CPU type "Core 2" See Intel Architecture Developer's Manual Volume 3B, Appendix A and Intel Architecture Optimization Reference Manual (730795-001) INST
18%
Time flies, but it can still be measured
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
.019s The process listing took about 3/100 of a second to execute in the real world and was allocated 5/1,000 of a second of CPU time in kernel mode (i.e., executing system calls) and about 2

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice