Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (199)
  • Article (46)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 25 Next »

26%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
26%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
with four SSDs, the write IOPS decreased with writeback activated from 14,400 to 3,000 – nearly 80 percent fewer IOPS. The only advantage of the write cache is low write latencies for RAID 5 sets. Because
26%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
languages that use a match expression to process data on the basis of its structure (e.g., in Scala [1], Rust [2], and F# [3]). A match statement takes an expression and compares it with successive patterns ... A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching. ... Pattern matching dispute in Python 3.10
26%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
": executable file not found in $PATH 0a2091b63bc5de710238fadc68ba3f5e0f9af8800ec7f76fd52a84c49a1ab0a7 Listing 3 shows that I do have a working container, so I'll deal with the network namespace error now
26%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
26%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
26%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40MB. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
26%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
capable of read speeds up to 4,900MBps (and up to 3,700MBps write speed), with total capacity of 512GB [6] (about $70). The unit is rated at a staggering 400K read and 900K write I/O operations per second
26%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
policy modules that are available and active on the system. The file is stored below /etc/selinux: # ls -lh /etc/selinux/targeted/policy/total 3.6M -rw-r--r--. 1 root root 3.6M Mar 3 13:28 policy.29
25%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
style as Redundancy Groups: RAID-1, RAID-Z1 (like RAID-5), RAID-Z2 (like RAID-6), and RAID-Z3 (with triple parity). Netgear uses these modes, too, but calls them RAID-5 and RAID-6, following the classic

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice