Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (235)
  • Article (83)
  • News (7)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 33 Next »

26%
Visualizing data captured by nmon
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Orlando Rosu, 123RF.com
wound up with approximately 250MB of nmon logfiles. Those who use the nmon Analyser Excel spreadsheet [3] know that you cannot process logs of that size without first having to do some customization
26%
Plundering treasures with Gitrob
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © pip, photocase.com
required the commands in Listing 3, executed as superuser. The tarball is about 85MB compressed. Listing 3 Go v1.8 Install $ curl -O https://storage.googleapis.com/golang/go1.8.linux-amd64.tar
26%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
. The problematic compression is disabled. Listing 1 Configuration Example SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2 SSLHonorCipherOrder on SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:DHE
26%
John the Ripper
22.08.2011
Home »  Articles  » 
 
to launch one of several different “modes” against your password hashes. The first mode is a quick crack attempt using the supplied password list file, password.lst . This list contains more than 3,000
26%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So, NIST announced ... SHA-3 – The New Hash Standard
26%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
directories, sets up links, and copies files into the zone to create the new system's layout (Listings 2 and 3). The installation also creates the zone's chrooted directory /zones/web1 and sets the appropriate
26%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
x86_64 2.9.1-9.el8 baseos 393 k groff-base x86_64 1.22.3-18.el8 baseos 1.0 M hwloc-ohpc x86_64 2.7.0-3
26%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm
26%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
                   x86_64 2.9.1-9.el8                           baseos          393 k  groff-base                 x86_64 1.22.3-18.el8                         baseos          1.0 M  hwloc-ohpc                 x86_64 2.7.0-3
26%
Linux device mapper writecache
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © lightwise, 123R.com
=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019 write: IOPS=118k, BW=463MiB/s (485MB/s)(10.0GiB/22123msec); 0 zone resets [ ... ] Run status group 0 (all jobs): WRITE: bw=463MiB/s (485MB/s), 463Mi

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice