Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (277)
  • Article (100)
  • News (19)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 40 Next »

33%
Security features in Windows Server 2022
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Matthew Henry on Unsplash
. Protected Data Transfer Windows Server 2022 supports Server Message Block (SMB) protocol encryption with AES 256 GCM (Galois/counter mode) and CCM (AES 256 counter mode and cipher block chain MAC (message
33%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
configuration file, AFICK uses the MD5 checksums, which are no longer considered totally secure but can be generated more quickly. In the configuration file, however, you can switch to SHA1 or SHA256 (more
33%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
will be 2.2GB lighter. Figure 1: The download options with the SHA256 checksum to make sure it matches the reported checksum on the site. Be sure
33%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
the /sha256 parameter to transfer the fingerprint of the certificate with which you want to sign the file. The issuing CA must be trusted by all computers that use this file, and the certificate must support
32%
Using rsync for Backups
07.01.2014
Home »  Articles  » 
 
the space used in the two backup directories and the SOURCE directory. The SOURCE directory reports using 9.2MB; backup.0 , the most recent snapshot, also reports using 9.2MB (as it should), and backup.1
32%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So
32%
Visualizing data captured by nmon
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Orlando Rosu, 123RF.com
wound up with approximately 250MB of nmon logfiles. Those who use the nmon Analyser Excel spreadsheet [3] know that you cannot process logs of that size without first having to do some customization
32%
Power Talk
01.10.2011
Home »  Articles  » 
 
. For HPC we have plenty of new capabilities, including plenty of new SSE instructions, support for 256-bit AVX, and even some instructions that are available only on AMD-based systems (XOP and FMA4). The new
32%
Interview: AMD’s John Fruehe, Director of Server Product Marketing
04.11.2011
Home »  HPC  »  Articles  » 
, virtualization, and database. Single-threaded applications are less important as every day goes by. For HPC, we have plenty of new capabilities, including plenty of new SSE instructions, support for 256-bit AVX
32%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
Threadripper CPU and can handle up to: 4 NVidia GPUs 256GB quad-channel DDR4 at 3200MHz 88TB, 4xM.2 PCIe Gen 4 NVMe, and 2.5" SATA drives The Thelio Mega also includes seven USB 3.2 Gen 2 Type

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice