Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (456)
  • Article (165)
  • News (35)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

18%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
_time n/a destroyed false version 1 That output looks promising; Vault has responded as expected. If that doesn't work correctly for you for some reason, then you've probably not exported
18%
John the Ripper
22.08.2011
Home »  Articles  » 
 
is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a-time attack on a password file. With a powerful
18%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
memory cells. Single-level cell (SLC) chips store 1 bit, multilevel cell (MLC) chips 2 bits, and triple-level cell (TLC) chips 3 bits per memory cell. Multiple memory cells are organized in a flash chip
18%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
) is entered in the database as 0xA4 – if you create the database with the ISO-8859P15 character set. However, if the database was created with a Unicode character set, then the Euro sign is stored as a three
18%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
on Information, Computer and Communications Security, 2010. [7] A More Secure Cloud for Millions of Google Apps Users [8] A. Haeberlen, “A Case for the Accountable Cloud,” Proceedings of the 3rd ACM SIGOPS
18%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this: makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \ 1.3.6.1.5.5.7.3.2 -len 2048 -e01
18%
Defining measures
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Lars Kienle on Unsplash
" payload has been created for measuring IOPS. This size is 4KB. The kilobyte [1] is defined as 1,000 bytes and is grounded in base 10 (10^3). Over time, kilobyte has been incorrectly used to mean numbers
18%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
Accounts: https://support.office.com/en-us/article/Configuration-of-General-and-Notification-Settings-6ad3a53f-470f-4f15-ad31-aca147385449
18%
Real World AWS for Everyone
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by adrian on Unsplash
]. Create access key pairs for the required tenants/users. An AWS access key always has a key ID in the form of AKIAJ4 PMEXHFYUHIXG2A and a secret access key such as :/ONT0HapjmLw7xni 6FPscmvPZJ Sc75hUXAQI+N3
18%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
, on the secondary node, enter: $ watch -n1 cat /proc/drbd You should see something similar to the output shown in Listing 3. When synchronization is 100 percent complete, the same file will showcase the output

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice