Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (659)
  • Article (171)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 89 Next »

9%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
. When the control panel deploys a WordPress server, its scripts assume that the server is running on Ubuntu 20.04 or 22.04. The other shortcoming is the user interface (UI). Because it is based on Word
9%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
. The following are a few examples to give you an idea of what you can name the extended file attributes for this namespace: user.checksum.md5 user.checksum.sha1 user.checksum.sha256 user
9%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
, this value can also be distorted by CPU scheduling on the hypervisor. RAM: A system with no free RAM is not good. If the Available MBytes value is clearly and permanently less than 256, action is required
9%
Software RAID in Windows, macOS, and Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Mirko Blicke on Unsplash
-b 4096 -E stride=128,stripe-width=256 /dev/md0 To mount the RAID, enter: mkdir /mnt/raid mount /dev/md0 /mnt/raid Finally, to mount the RAID automatically when you boot your Linux computer, add
9%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
a hash of the input and also of any outputs (specified using hof=, hofs=, phod=, or fhod=. ALGORITHM options include md5, sha1, sha256, or sha512. hashlog=FILE – Log total hashes and piecewise hashes
9%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
, and a user type (admin or normal). The hash is a SHA-256 hash of the password. Listing 1 shows an example configuration. Listing 1 Example auth Element appConfig: auth: users
9%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. If needed, you can create more users. The settings for this can be found in the USERS subsection. Each user entry consists of the following data: Username:sha256(Password):UID:filter_netmask The UID value
9%
Comparison of storage clouds
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© pakhnyushchyy, 123RF.com
Yes, Blowfish Yes, AES256 No Searching By file name In browser and in client via OS In browser and in client via OS In client via OS For metadata
9%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
Typically the encryption keys are 128- or 256-bit Advanced Encryption Standard (AES) keys, which evidently is fairly strong encryption. (My apologies, but I’m not in a position to judge the quality
9%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
AES 256 Bit, Volume Based Folder Based Yes AES 256 Bit, Drive Based Compression No No No Yes Deduplication

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 89 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice