Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (185)
  • Article (71)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

28%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
rq2 ra92 08 set rq3 cdrom 09 10 attach rq0 d0.dsk 11 attach rq1 d1.dsk 12 attach rq2 d2.dsk 13 14 attach -r rq3 cdrom.iso 15 16 set rl disable 17 set ts disable 18 19 set xq mac=08-00-2B-AA-BB-CC 20
28%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
import ( 04 "crypto/md5" 05 "crypto/sha1" 06 "crypto/sha256" 07 "crypto/sha512" 08 "encoding/hex" 09 "hash" 10 "io" 11 "log" 12 "os" 13 ) 14 15 func genChecksum(file, hashfunc string
28%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
: In LR-DIMMs, all of the signal lines (including the data) run through an intermediate chip; this reduces the electrical load on the memory controller. LR-DIMMs have an Isolation Memory Buffer (iMB
28%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
28%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
28%
New features in PHP 7.3
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © MIR, Fotolia.com
, many developers convert their content to uppercase or lowercase, for which the extension for multibyte strings has several functions. For example, mb_strtoupper("Street"); returns the text STREET
28%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
 crash /proc/iomem   03000000-0affffff : Crash kernel [root@rhel ~]# grep crash /proc/cmdline ro root=/dev/mapper/VolGroup00-LogVol00 rd_NO_LUKS KEYBOARDTYPE=pc \ KEYTABLE=de-latin1-nodeadkeys rd
28%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
 -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9 option (i.e., maximum compression), the resulting file is 268KB. The .gz
28%
Read-only file compression with SquashFS
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © modella, 123RF.com
:31 FS_scan.csv $ gzip -9 FS_scan.csv $ ls -lsah FS_scan.csv.gz 268K -rw-r--r-- 1 laytonjb laytonjb 261K 2014-06-09 20:31 FS_scan.csv.gz The original file is 3.2MB, but after using gzip with the -9
28%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice