Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (228)
  • Article (79)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 32 Next »

25%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So, NIST announced ... SHA-3 – The New Hash Standard
25%
Virtualization via Zones
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Pei Ling Hoo, 123RF.com
directories, sets up links, and copies files into the zone to create the new system's layout (Listings 2 and 3). The installation also creates the zone's chrooted directory /zones/web1 and sets the appropriate
25%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
the servers to the console through the agent. (3) Use "bouncers" to prevent attacks actively, wherein the system simply blocks certain IP addresses. Typically, you can use the package manager to install Crowd
24%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
or decryption of data. The ciphers supported in OpenSSH 7.3 are: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm
24%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
compared with version 1.x are noticeable in Tomoyo versions 2.2.x and 2.3.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel 3.2, which
24%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
, 50GB of memory, and a 1Gb NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT. In contrast to RHEV 2.2, RHEV 3 is no longer based on RHEL ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt 3.1 ... Managing virtual infrastructures with oVirt 3.1
24%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
push remote.repository.com:5000/alpine:latest The push refers to repository [remote.repository.com:5000/alpine] 73046094a9b8: Pushed latest: digest: sha256:0873c923e00e0fd2ba78041bfb64a105e1ecb7678916d1f
24%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
A study [3] of real memory errors took place at Google. During their investigations they found that one third of the machines and more than eight percent of the DIMMs saw correctable errors per year
24%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
24%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
5221548db 58 seconds ago 5.67MB 80dc7d447a48 About a minute ago 167MB alpine 3.9 78a2ce922f86 5 months ago 5.55MB The command you really

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice