Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (181)
  • Article (70)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

28%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
28%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
28%
New features in PHP 7.3
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © MIR, Fotolia.com
, many developers convert their content to uppercase or lowercase, for which the extension for multibyte strings has several functions. For example, mb_strtoupper("Street"); returns the text STREET
28%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
 crash /proc/iomem   03000000-0affffff : Crash kernel [root@rhel ~]# grep crash /proc/cmdline ro root=/dev/mapper/VolGroup00-LogVol00 rd_NO_LUKS KEYBOARDTYPE=pc \ KEYTABLE=de-latin1-nodeadkeys rd
28%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
 -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9 option (i.e., maximum compression), the resulting file is 268KB. The .gz
28%
Read-only file compression with SquashFS
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © modella, 123RF.com
:31 FS_scan.csv $ gzip -9 FS_scan.csv $ ls -lsah FS_scan.csv.gz 268K -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9
28%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So
28%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about 12.5MB of new software is installed. Logwatch gets configuration details several ways: from script
28%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So, NIST announced
28%
Stretching devices with limited resources
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Lucy Baldwin, 123RF.com
the external 12V power supply provided and the USB interface for serial access. Table 1 ESPRESSObin Technical Specs SOC Marvell Armada 3700LP (88F3720) ARM Cortex A53 processor

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice