Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb"22%A9n Llorente ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (30)
Keywords

« Previous 1 2 3

29%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
29%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
Chris Buechler and Scott Ullrich were unhappy. Although the FreeBSD m0n0wall distribution gave them a quick option for setting up a firewall and a router, it was designed for use on embedded systems
29%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3
28%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm9TRn9YIzA47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk9DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
28%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sda 20 Account information: 21 ACL information: 22 ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
28%
Galera Cluster for MySQL
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Noel Powell, fotolia.com
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[a-z]?eth[0-9
28%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
another could allow the user to set up memory of between 1 and 8GB in increments of 512MB. The Deltacloud API bundles all these possibilities into hardware profiles, which means the clients are provided
28%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
depends on the liblzo2-2, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
28%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) with 12 Serial ATA disks, a 320 UW SCSI controller for the host connection, and 512MB cache. I configured various disk groups and logical volumes on this powerful hardware and exported them to the backup
28%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.9.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions

« Previous 1 2 3

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice