Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %256mb 12%A9n Llorente"22 ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (66)
  • Article (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

77%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI0S3r.L0'; 17 // stored hash, would
77%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
ScanOptions 21 { 22 Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.A4, 25 Dpi = 300 26 }; 27 28 var images = new List
77%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9
77%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8
76%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
76%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
the Ubuntu Precise (12.04) Universe repository and as a package for Debian Sid. To install the server on Linux, you first need to install the necessary packages; the example here uses an Ubuntu distribution
76%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Kheng Ho Toh, 123RF.com
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0 22:40 ? 00:00:00 [o2hb-BD5A574EC8] root 7935 7
76%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
686 oprofile-0.9.5-4.fc12.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
76%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
_world[]="Hello World\n"; 08 static dev_t hello_dev_number; 09 static struct cdev *driver_object; 10 static struct class *hello_class; 11 static struct device *hello_dev; 12 13 static ssize_t driver_read( struct file
76%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice