Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 83 Next »

23%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
libraries, so how do you handle situations in which you need to change tool sets or applications? You can do it the hard way, or you can do it the easy way with Environment Modules. ... in the situation where you want to run multiple jobs each with a different compiler/MPI combination. For example, say I have a job using the GCC 4.6.2 compilers using Open MPI 1.5.2, then I have a job using GCC 4 ... libraries, so how do you handle situations in which you need to change tool sets or applications? You can do it the hard way, or you can do it the easy way with Environment Modules.
23%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
potential approaches for common use cases. ... Authenticator Project is released under the Apache License 2.0 and is freely available. A PAM module is available for the server; the Google Authenticator client runs on Android, iOS, and BlackBerry devices ... potential approaches for common use cases.
23%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2. ... and minutely investigated. But Schneier’s words fell on stony ground. On October 2, NIST announced the winner: Keccak, a development by a Belgian team of scientists, is to become the new SHA-3 standard. For co ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard, but in real life, many users are still waiting to move to its predecessor, SHA-2.
22%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
the password against a dictionary or for certain character strings. For example, although "2021" is not allowed in a password and the password manager will protest, it will still accept "2o21" as an entry ... Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles
22%
Shell in a Browser
15.03.2012
Home »  Articles  » 
 
PHP Shell and Shell In A Box put a shell in your browser, thus facilitating web server management – even from the nearest Internet café and without SSH access. ... in to multiple computers, shellinaboxd -s /host1/:SSH:host.example.com -s /host2/:SSH:host2.example.com which lets you connect to host.example.com with the URL http://localhost:4200/host1/ and open an SSH ... PHP Shell and Shell In A Box put a shell in your browser, thus facilitating web server management – even from the nearest Internet café and without SSH access.
21%
Requirements for centralized password management
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
ccvision
administrator is not available. In Case of Emergency The classic solution to this problem is a list of passwords in a sealed envelope that is deposited in a vault and handed over when an emergency occurs ... Time and again, situations arise in which admins need access to a system they do not otherwise manage. But, do you want to hand over responsibility for password management to a centralized software
21%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
. Future version numbers of FreeNAS will reflect the FreeBSD version on which the system builds. This explains why the developers moved from 0.7 to 8.0.2 and will be sticking to this schema in future. New ... Setting up your own NAS with FreeNAS 8.0.2
20%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
on specific use cases, and effective integrity systems must be capable of producing characterizations with sufficient information for situational assessment. Failure to include all relevant information ... cases through the incorporation of integrity information in their inputs.
20%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
of all cases, SQL injection was the root cause of a server’s compromise. ... Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry ... of all cases, SQL injection was the root cause of a server’s compromise.
20%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
Interface (UEFI) is enabled on the target system plays a role. In all cases, the recommendation is to use the free Etcher [2] tool to install the ISO file on your USB stick. Pay attention to the obligatory ... Discover the advantages and disadvantages of turning a bare metal system into the core of an antMan cloud and whether the free Community Edition and its limitations will work in your case.

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice