Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (106)
  • Article (45)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 16 Next »

17%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
, according to the README file, requires "half the memory, all in a binary less than 40MB" to run. By design, it is authored with a healthy degree of foresight by the people at Rancher [3]. The GitHub page [4
17%
SSHFS for Shared Storage
15.09.2020
Home »  HPC  »  Articles  » 
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
17%
Userspace secure filesystem
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © mipan, 123RF.com
need SSH active on both systems. Almost all firewalls are set up to allow port 22 access or have mapped port 22 to a different port that can accommodate SSHFS. All the other ports can be blocked
17%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
FILE *ptr_myfile; 16 17 counter_limit = 100; 18 19 ptr_myfile=fopen("test.bin","wb"); 20 if (!ptr_myfile) 21 { 22 printf("Unable to open file!"); 23 return 1; 24 } 25 for ( counter=1; counter <= counter
17%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
to the needs of an application. After all, the standard libraries in Java 8 weigh in at around 60MB and 20,000 classes. They not only need space on the hard drive, but the computer also needs to load them
17%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
}) 051 labelHash := widget.NewLabel("Hash:") 052 053 radioGroup := widget.NewRadioGroup([]string{"md5", "sha1", "sha256", "sha512"}, func(s string) { 054 055 }) 056 057 radioGroup.SetSelected("md5
17%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :22
16%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
, 256-bit AES for Phase 1, and because it was unclear at the start of the test which implementation could handle which algorithm or PFS groups.  In Phase 2, I wanted to use AEA256, SHA1, and PFS2
16%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 22); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
16%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice