Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %2522Rub&123%25390 Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (451)
  • Article (118)
  • News (34)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 61 Next »

29%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
: XXXXXXXXXXXXXXXXXX 6 Firmware Revision: 2CV102HD 7 Transport: Serial, ATA8-AST, SATA 1.0a, SATA II Extensions, SATA Rev 2.5, SATA Rev 2.6 8 Standards: 9 Used: ATA/ATAPI-7 T13 1532
29%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
Schneier's blog entry: http://www.schneier.com/blog/archives/2012/09/sha-3_will_be_a.html Talk at 25C3 about spoofed MD5 signatures: http://media.ccc.de/browse/congress/2008/25c3-3023-en
29%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Maksym Mzhavanadze, 123RF.com
a progress indicator like this [ 30% ] Applying progress: 43:22 mins remaining. during the transfer process. When the image is fully transferred to the USB drive, you need to enter one final command to copy
29%
Maatkit tools for database administrators
17.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
,200, comprising 55 different commands, were issued. The system, a server with 768MB RAM and a Pentium 3 CPU, took a total of 22 seconds to answer them, the longest response took 32 milliseconds, the shortest
29%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
's usually TCP port 22) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
29%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
/* connect {}: controls servers we connect to (OLD C:, N:, H:, L:) */ 02 connect "services.irc.hastexo.com" { 03 /* the name must go above */ 04 05 /* host: the host or IP to connect to
29%
Archiving email and documents for small businesses
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Pavlenko Evgenly, fotolia.com
} 20 \usepackage{ngerman} 21 \usepackage[official,right]{eurosym} 22 \\\begin{document}" > att1.tex 23 echo "\end{document}" > att3.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
29%
The Swiss Army knife of fault management
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Dmitry Rukhlenko, 123RF.com
="walk" value="true"/> 22 23 24 25
29%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
29%
Server virtualization with Citrix XenServer
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Goss Vitalij, Fotolia
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length != 3 && args.length != 5) 21 { 22 System

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 61 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice