Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (280)
  • Article (100)
  • News (19)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 41 Next »

31%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
a few tools in this area can help with encrypting data. For example, you can use the Boxcryptor tool [5] to encrypt data using AES-256 and RSA. The data is encrypted with a password and a keyfile
31%
Legally compliant blockchain archiving
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Jade Masri on Unsplash
of a raw data hash (SHA256) and a UUID (per document) and is valid for all processes in the system (Figure 2). Thus, it is possible at any time to restore individual data records or even the entire database
31%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
change the settings for the backup at any time, of course. You can also use Properties/Bandwidth Throttling to limit the bandwidth available to the online backup. You can enter data from 256Kbps to 1Gbps
31%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
push remote.repository.com:5000/alpine:latest The push refers to repository [remote.repository.com:5000/alpine] 73046094a9b8: Pushed latest: digest: sha256:0873c923e00e0fd2ba78041bfb64a105e1ecb7678916d1f
31%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
. Systems like this are usually equipped with 256 or 512GB of RAM. As a result of overcommitting CPU resources, a total of 56 virtual CPU cores are available, of which the provider normally passes 50
31%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
256. Each location has four different types of network: LAN, servers, DMZ, and telephony. In Figure 2, the third wireless LAN network at the Boston location would have a subnet value of 0103
31%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
be used in conjunction with the software client. The connection between the client software and workstation host card is encrypted by default using SSL/TLS (AES 256-bit). Conclusions The use of remote
31%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
Services Vaults in Azure keep the whole thing safe. Data transmission is via HTTPS, and each vault is encrypted with AES 256. You will receive the key during the configuration, and if you lose it, you're out
31%
Defining measures
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Lars Kienle on Unsplash
of 1KiB (in case really small payload sizes have some exceptional performance); 4KiB, 32KiB, or 64KiB; and maybe even 128KiB, 256KiB, or 1MiB. The reason I like to see a range of payload sizes
31%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
into a fixed character string by a hash function. This character string, also known as a hash, represents the original data but cannot be easily converted back. One common example of hashing is the SHA-256

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 41 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice