Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (211)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 102 Next »

14%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
. Whereas video CDs usually have a capacity of around 700MB, video DVDs that follow the DVD-18 standard can store around 17GB. The significantly higher storage capacity not only makes it possible to offer
14%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
available in both free and commercial versions. According to the manufacturer, more than 4,000 customers deploy Endian Firewall Enterprise, and more than 1.2 million users have downloaded the community
14%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of around 250MB to Amazon's S3 storage very effectively. A number of successful container technologies have been used extensively in the past, including LXC, Solaris Zones, and FreeBSD jails, to name
14%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
budget [5] – it's not only the capacity but also the performance that influences user acceptance. The network should not use legacy 10Mb technology, which is often encountered in the form of small
14%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
_hosts) on each SSH client that stores information about fingerprints and an SHA256 hash of the public key of trusted communication partners. SSH now checks this information for a match each time a connection
14%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
constraint: requires maxRead(argv[1] @ example1.c:8:20) <= 9 needed to satisfy precondition: requires maxSet(buffer @ example1.c:8:12) >= maxRead(argv[1] @ example1.c:8:20) derived from
14%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
://www.alienvault.com/ Monkey Web Server Version 1.2 Monkey is a fast web server with minimal memory requirements that is particularly designed for embedded devices. To serve many requests with few resources, Monkey uses
14%
Tech News:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
that you can replace the Ubuntu-based environment used in WSL with other versions of Windows. SUSE/openSUSE engineers have managed to bring openSUSE to Windows 10. In a January 12 entry in the SUSE blog
14%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
.getenv("REDIS_HOST", "localhost") 07 r = redis.Redis(host=redis_host, port=6379, decode_responses=True) 08 09 @app.route('/') 10 def hello(): 11 count = r.incr('counter') 12 return f'Hello, you have visited {count} times.' 13
14%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
generated SHA1, the master key and payment key are generated using a proprietary algorithm and SHA256 and written to the key.dat file. Each key has a length of 32 bytes (256 bits). Encryption

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice