Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (295)
  • Article (100)
  • News (19)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 42 Next »

32%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
. The following are a few examples to give you an idea of what you can name the extended file attributes for this namespace: user.checksum.md5 user.checksum.sha1 user.checksum.sha256 user
32%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
,aes256-cbc For once, you don't have to restart the server; just launch a new session to make sure it works. These lines should speed up your console sessions on slow connections, such as when using dial
32%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
, this value can also be distorted by CPU scheduling on the hypervisor. RAM: A system with no free RAM is not good. If the Available MBytes value is clearly and permanently less than 256, action is required
32%
Software RAID in Windows, macOS, and Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Mirko Blicke on Unsplash
-b 4096 -E stride=128,stripe-width=256 /dev/md0 To mount the RAID, enter: mkdir /mnt/raid mount /dev/md0 /mnt/raid Finally, to mount the RAID automatically when you boot your Linux computer, add
32%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
a hash of the input and also of any outputs (specified using hof=, hofs=, phod=, or fhod=. ALGORITHM options include md5, sha1, sha256, or sha512. hashlog=FILE – Log total hashes and piecewise hashes
32%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and a user type (admin or normal). The hash is a SHA-256 hash of the password. Listing 1 shows an example configuration. Listing 1 Example auth Element appConfig: auth: users
32%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. If needed, you can create more users. The settings for this can be found in the USERS subsection. Each user entry consists of the following data: Username:sha256(Password):UID:filter_netmask The UID value
32%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
Yes, Blowfish Yes, AES256 No Searching By file name In browser and in client via OS In browser and in client via OS In client via OS For metadata
31%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
. Therefore, if I’m going to back up my data to cloud storage, I want to make sure the data is encrypted. S3QL encrypts all data using a 256-bit AES key. An additional SHA-256 HMAC checksum protects the data
31%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice