Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (75)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

24%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
", "address3"] 05 :addresses "floeff@mycompany.tld" 06 :subject "Out of office" 07 "This is an automatically generated message. 08 09 I am out of the office until September 5th, 2011. Your 10 e
24%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
visit the ClusterLabs website [3]. Infos Details of STONITH with SBD: http://www.linux-ha.org/wiki/SBD_Fencing The meatware STONITH plugin: http://hg.linux-ha.org/glue/file/0a08a469fdc8/doc
24%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
type="text" name="firstname"> 07
08 09 10 11 Listing 3 shows the content
24%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3
24%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
24%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
-incremental:lanman passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2 04 guesses: 0 time: 1:09:25:10 (3
24%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
Shell 2.0, which I use here. Windows 8 and Windows Server 8 will use the new PowerShell 3.0, to be released soon. To begin, I introduce PowerShell information retrieval to you via the "Get" commands
24%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
end (Figure 2). Listing 3 update-dns 01 #!/usr/bin/perl 02 03 use DBI; 04 05 $db_user = "powerdns"; 06 $db_passwd = "powerpass"; 07 08 $hostname = $ARGV[0] . ".my.org"; 09 $ip = $ARGV[1
24%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
.84 132.71 3,127.50 713.77 4.11 mandel 5.55 31.15 65.44 824.68 156.68 5.67 pi_sum 0.74 18.03 1.08 328
24%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
0 0 37928 84 0 1 0 0 08 3 1 1405 2170 0 0 52272 114 0 0 0 0 09 1 0 1267 2125 0 0 6152 14 0 0

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice