Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (216)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 22 Next »

18%
Password protection with Phpass
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Michael Moeller, fotolia.com
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [3], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
18%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
crack attempt using the supplied password list file, password.lst. This list contains more than 3,000 commonly used passwords (Listing 2). Listing 2 Cracking with the Password List File 01
18%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
data. 3. The data server now opens a direct connection to the tape server and sends a stream of backup data via the connection. The logs on both sides and transferred file history are sent
18%
Intrusion detection with Prelude
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Chittima Kasa, 123RF.com
in the Ubuntu 11.x and Debian 6.x package sources. You can also opt for the host-based IDS OSSEC by Trend Micro [3]. If the Prelude Manager is running on a remote server, the rule-based Prelude Correlator
18%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
experience [2]. A good tool for cache control is vmtouch [3], which is at home on most Linux 2.6, FreeBSD 7.x, or Solaris 10 kernels; mileage may vary on other *nix variants. Expect partial functionality
18%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
/init for event conditions that cannot be fulfilled – that is, the jobs would never start or stop of their own accord. These two commands were introduced in their current form in Upstart version 1.3, which in turn
18%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
[2] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.0 release [3
18%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
opcontrol --list-events oprofile: available events for CPU type "Core 2" See Intel Architecture Developer's Manual Volume 3B, Appendix A and Intel Architecture Optimization Reference Manual (730795-001) INST
18%
Remotely controllingvirtual machines with virsh
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sellingpix, 123RF.com
is required in some cases – on openSUSE 11.3, you would issue the rclibvirtd start command, for example. After doing this, virsh version should output the version numbers of the components involved
18%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
authorities. CAcert [3] is a community-based alternative solution. Finally, another option is to create self-signed certificates with OpenSSL. Listing 1 takes you through the steps required for this. If you

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice