Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 154 Next »

11%
News for Admins
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
© Elnur Amiskishiyev, 123RF.com
has been installing a backdoor called Trojan.Kwampirs on machines that are used to control medical equipment like X-ray and MRI systems. In addition, Orangeworm also seems interested in machines
11%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
a registry to create a root filesystem for the container. With the OCI run-time tools [9], a JSON file is then created, which describes the start procedure for the container. Finally, the crio daemon calls
11%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
5) and Drupal call themes and Joomla calls templates. The WordPress and Drupal developers each have a theme catalog on their homepage. WordPress users can even access it conveniently from the back end
11%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
://drownattack.com/drown-attack-paper.pdf. Linux Backdoor Doesn't Need Root Privileges Researchers have discovered a new backdoor called Fysbis that is aimed at Linux machines. The new malware has extremely sophisticated properties, and experts
11%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
:fedora-atomic/f22/x86_64/vim # systemctl reboot Once the system has rebooted, calling rpm-ostree should confirm that the filesystem tree just created is in use and is now available to the Vim editor on the system
11%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
.netdev. Listing 4 Bridge Configuration [NetDev] Name=docker0 Kind=bridge Next, you can call up the networkctl tool to see a status overview of the existing network devices from the perspective
11%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
names are also identical and in the same order as for the dropper. MWI also offers users the option of accessing an additional module called MWISTAT. This module enables communication to a command
11%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
will stop the attack if any [Niantic] staff talked with us, because we will teach them how to protect their servers," a member of OurMine told PC Magazine . Another group called PoodleCorp is claiming
11%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
and correct what are called single-bit errors, and although it can detect double-bit errors, it cannot correct them. A simple flip of one bit in a byte can make a drastic difference in the value of the byte
11%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
suma module with the oslevel: 'latest' parameter under the tasks: directive. Understanding what this (suma) module does is not important (right now), but understanding how you "call" the AIX modules from

« Previous 1 ... 95 96 97 98 99 100 101 102 103 104 105 106 107 108 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice