Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (352)
  • Article (100)
  • News (19)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 48 Next »

31%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and a user type (admin or normal). The hash is a SHA-256 hash of the password. Listing 1 shows an example configuration. Listing 1 Example auth Element appConfig: auth: users
31%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. If needed, you can create more users. The settings for this can be found in the USERS subsection. Each user entry consists of the following data: Username:sha256(Password):UID:filter_netmask The UID value
31%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
Yes, Blowfish Yes, AES256 No Searching By file name In browser and in client via OS In browser and in client via OS In client via OS For metadata
31%
Operating large language models in-house
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Conner Baker on Unsplash
, the server should have enough RAM to process large volumes of data quickly. In many cases, 256GB or more RAM makes sense, especially when it comes to large neural networks or processing big data. The storage
31%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
. Therefore, if I’m going to back up my data to cloud storage, I want to make sure the data is encrypted. S3QL encrypts all data using a 256-bit AES key. An additional SHA-256 HMAC checksum protects the data
31%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality
31%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
AES 256 Bit, Volume Based Folder Based Yes AES 256 Bit, Drive Based Compression No No No Yes Deduplication
31%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
.2. Weak hash functions, namely SHA-1 and MD5, are disallowed in favor of SHA-256 and SHA-384, with a few notable exceptions. The use of SHA-1 is permitted with respect to client and server certificates (but
31%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
.168.90.211 max-limit=0/0 /queue simple> add name=students target=192.168.90.0/24 max-limit=256K/512K A rule called doctor sets unlimited available bandwidth for the computer at address 192.168.90.211 (0
31%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
the passphrase as the real key; don't use a hash algorithm. For example: losetup -e aes -k 256 -N /dev/loop0 partition.img If your distribution uses a special derivate of losetup from the loop-aes package

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice