Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (380)
  • Article (123)
  • News (8)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 52 Next »

18%
Open source customer relationship management software
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Martina Berg, Fotolia.com
10 11 Options Indexes FollowSymLinks MultiViews 12 AllowOverride None 13 Order allow,deny 14 allow from all 15 16
18%
Introducing parity declustering RAID
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Author, 123RF.com
/s, 133M issued at 133M/s, 81.6M total 0B repaired, 163.06% done, no estimated completion time scan: resilvered (draid1:3d:5c:1s-0) 20.2M in 00:00:00 with 0 errors on Mon Oct 24 17:11:22 2022
18%
Advanced monitoring techniques for Azure VMs on Linux
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Paul Morley on Unsplash
verify these checksums: import hashlib def calculate_checksum(log_entry): return hashlib.sha256(log_entry.encode('utf-8')).hexdigest() # Example log entry log_entry = "2024-06-15 12:00:00 Failed login
18%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
/apps/apps/conda/pkgs [sudo] password for laytonjb: [laytonjb@warewulf ~]$ ls -lstar /opt/apps/apps total 12 4 drwxrwxrwx 5 root root 4096 Mar 12 11:15 .. 4 drwxrwxrwx 3 root root 4096 Mar 12 11:15 . 4 drwxrwxrwx 4 root root
18%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Formation and Terraform in this article as points of comparison, the list of other tools that can provision infrastructure is long: Troposphere [12], Sceptre [13], Bash scripts, custom apps leveraging SDKs, Ansible [14
18%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
: In LR-DIMMs, all of the signal lines (including the data) run through an intermediate chip; this reduces the electrical load on the memory controller. LR-DIMMs have an Isolation Memory Buffer (iMB
18%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
18%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
18%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
18%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice