Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (135)
  • Article (60)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

25%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
:13 ipa.initramfs.sha256 13 -rw-r--r-- 1 42422 42422 9.1M Mar 2 10:13 ipa.kernel 14 -rw-r--r-- 1 42422 42422 101 Mar 2 10:12 ipa.kernel.sha256 15 16 # file /var
25%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
.0.3.0/24 !10.0.3.0/24 root@ubuntu:~# ps -eaf | grep dnsmas lxc-dns+ 1047 1 0 18:24 ? 00:00:00 dnsmasq -u lxc-dnsmasq --strict-order --bind-interfaces --pid-file=/run/lxc/dnsmasq.pid --conf
25%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So
25%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
(Figure 1). Although you will need to install the freeware program on the computer you want to examine first, the program is quite small, occupying less than 5MB of space on the hard drive
25%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
. Immediately after posting a sample, Cuckoo outputs appropriate messages on the console (Listing 3). Listing 3 Cuckoo Output 2016-07-25 17:37:00,192 [lib.cuckoo.core.scheduler] INFO: Starting
25%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
Controller login2$ ls -s /sys/devices/system/edac/mc/mc0 total 0 0 ce_count 0 csrow1 0 csrow4 0 csrow7 0 reset_counters 0 size_mb 0 ce_noinfo_count 0 csrow2 0 csrow5 0 device 0 sdram
25%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
will be 2.2GB lighter. Figure 1: The download options with the SHA256 checksum to make sure it matches the reported checksum on the site. Be sure
25%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
, but it quite quickly reaches its limits, because this network model generates a maximum of 256 nodes. Although 256 nodes is rather a small cluster for a project with the ambitions of Kubernetes, they can
25%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
{ "$schema" : "https://aka.ms/winget-packages.schema.2.0.json", "CreationDate" : "2024-03-05T03:41:14.411-00:00", "Sources" : [ { "Packages" : [ { "PackageIdentifier" : "Microsoft.VisualStudio.2022.Community
25%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So, NIST announced

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice