Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (110)
  • Article (52)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 17 Next »

29%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
:jonathonf/python-3.6 $ apt-get update $ apt-get install python3.6 In Figure 3 you can see that Python v3.6 adds about 23MB of files to your machine. Depending on how much time you've spent with Python, you might
29%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
. The final step is the firewall rule, and the VPN is ready (Figure 10). Listing 12: Fortinet, Phase 2 01 edit "srx-phase2" 02 set phase1name "srx-phase1" 03 set proposal 3des-sha1 aes256-sha1 04 set
29%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st0.0; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24; 20 remote
29%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
2P). Listing 2P: Python Code Example with Output in Loop (One-by-One) 1 #!/usr/bin/python 2 3 if __name__ == "__main__": 4 5 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0}; 6 7 counter
29%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
29%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
://www.example.com creates 30 concurrent users to hit the site. The stats you get back are useful: Lifting the server siege... done. Transactions: 422 hits Availability: 100.00 % Elapsed
29%
Even benchmarks can be easy to handle
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
. You can create memory pressure in the system by launching eight RAM hogs: stress -m 8 --verbose These tasks malloc 256MB and touch a byte every 4096 bytes, which dirties each memory page and forces
29%
Bringing old hardware back into the game
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Lucy Baldwin, 123RF.com
and doubles the cache size (from 3 to 6MB), in exchange for a small drop in baseline clock speed – 2.3 to 2.2GHz (peak drops from 3.2 to 3.1GHz). Major Surgery Legend has it that no one has ever opened
29%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
.0/24 !10.0.3.0/24 root@ubuntu:~# ps -eaf | grep dnsmas lxc-dns+ 1047 1 0 18:24 ? 00:00:00 dnsmasq -u lxc-dnsmasq --strict-order --bind-interfaces --pid-file=/run/lxc/dnsmasq.pid --conf
29%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice