Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (128)
  • Article (57)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 19 Next »

21%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
exists, renaming the old one with ID sha256: f09fe80eb0e75e97b04b9dfb065ac3fda37a8fac0161f42fca1e6fe4d0977c80 to empty string Loaded image: nginx:latest With the docker images command, you can see
21%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
): 11 12 s = 0.0 13 s += h * f(a) 14 for i in range(1, n): 15 s += 2.0 * h * f(a + i*h) 16 # end for 17 s += h * f(b) 18 return (s/2.) 19 # end def 20 21 22 # Main section 23 comm = MPI
21%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
that the conversion took effect: $ sudo lvs -a vg-cache -o devices,segtype,lvattr,name,vgname,origin   Devices          Type       Attr       LV              VG       Origin   /dev/nvme0n1(0)  linear     Cwi-aoC
21%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
.0 MB 2014-03-01 10:15 36467d 1 04 three.img 0 4.0 MB 0.0 MB 0.0 MB 2014-03-01 10:16 4e5a1c 3 05 two.img 0 4.0 MB 0.0 MB 0.0 MB 2014-03-01 10:15 a27d79 2 06 quark
21%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
to change lines 12 and 14. To make life easier, I will refer to this as the “array” code, as I did with the C example. Listing 2F: F90 Code Example with Output in Loop (Array) 1 program ex1a 2 3
21%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
2fuTVWnj7LDsEh3NzrhjGYlhWmtvrXg3mlFelz/MZ 08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC 09 mh5C8E7xSw== 10 mozilla.org. 6074 IN DNSKEY 256 3 7 11 AwEAAcY1VDPt
21%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1 ... The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
21%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
://creativecommons.org/licenses/by-sa/3.0/ Splint: http://splint.org Hoare, C.A.R. An axiomatic basis for computer programming. Communications of the ACM , 1969;12(10):576-583, https://web.archive.org/web/20160304013345/http
21%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVonC2a$sa1WA0G3mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.N.cl" collections
21%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
key RSA EIGamal DSA Cipher IDEA 3DES CAST5 Blowfish AES-128/-192/-256 Twofish Camellia-128/-192/-256 Hash MD5

« Previous 1 2 3 4 5 6 7 8 9 10 ... 19 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice