Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 00 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (430)
  • Article (111)
  • News (10)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 56 Next »

17%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
17%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
and criticized the payment of ransom across society [3]. Although many insurance companies will pay the ransom today, some providers have already explicitly ruled out payment. Of course, criminals are also
17%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
for these systems; they normally reside in the builder/website/ directory [3]. To download, for example, an image for installing Fedora 19, change to the builder/website directory and issue the following command when
17%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
17%
Podman for Non-Root Docker
05.08.2024
Home »  HPC  »  Articles  » 
 catatonit conmon containernetworking-plugins crun golang-github-containers-common   golang-github-containers-image netavark passt podman 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Need to get 32.3 MB of archives. After this operation, 131 MB
17%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
SeverityValue = 3; else $SyslogSeverityValue = 6; 20 21 # The name of the file is also sent with the file 22 Exec $FileName = file_name(); 23 24 # The SourceName variable is set by default to 'NXLOG'. To send
17%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
the data across all nodes: cockroach start --insecure --join=,,3> This ensures that the previously stopped node receives any updates that occurred during
17%
Identifying and using software licenses
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © alphaspirit, 123RF.com
) [1] and the Open Source Initiative (OSI) [2]. A distinction can essentially be made between copyleft, permissive, and public domain licenses. Copyleft licenses [3] oblige the licensee to publish any
17%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
of output provide information about the search and the type of output: # extended LDIF # LDAPv3 # base with scope subtree # filter: (objectClass=olcDatabaseConfig) # requesting: olc
17%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice