Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (451)
  • Article (109)
  • News (6)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 57 Next »

17%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
submitted his master's thesis on the subject of TCP Stealth in 2014 [12]. If you have been following the port knocking scenario for a few years, you might remember SilentKnock [13]. The project uses the same
17%
A web application with MongoDB and Bottle
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Egor Arkhipov, 123RF.com
>My little Bottle example 06 07 08 09

Hi World..here is my little survey!

10 11 12 What is your favorite club?
13
17%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
clear 03 while true 04 do 05 echo "New record" 06 maxrecord=`ls -1 *.dat | sort | tail -1 | cut -d. -f 1` 07 newrecord=$(echo $maxrecord + 1 | bc ) 08 width=`echo $newrecord | wc -c` 09 10 ... 11 12
17%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality
17%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
computers or the layout of the OSDs. Whether the work in Ceph is handled by three servers with 12 hard drives or 10 servers with completely different disks of different sizes is not important
17%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
: 09 Content-Type: application/sdp 10 Content-Length: 142 11 12 v=0 13 o=alice 53655765 2353687637 IN IP4 pc33.atlanta.com 14 s=- 15 t=0 0 16 c=IN IP4 pc33.atlanta.com 17
17%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
the code states should be good enough for caches up to 20MB. The Stream FAQ recommends you use a problem size such that each array is four times the sum of the caches (L1, L2, and L3). You can either change
17%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
(Figure 1). Although you will need to install the freeware program on the computer you want to examine first, the program is quite small, occupying less than 5MB of space on the hard drive
17%
Secure data transfer with FTP alternative MFT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ulrich Mueller, 123RF
recipient can download and decrypt the files. Data is safe not only during transport, but also in temporary storage. When choosing the encryption strength of the MFT system, you should opt for the secure 256
17%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
's around 85MB), known as the core or ubuntu-core snap. It offers other snaps a read-only filesystem that can also rely on basic libraries, an init package (systemd), and networking. This is called an OS snap

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice