Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 48 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (207)
  • Article (63)
  • News (8)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 28 Next »

69%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
Demo Inventory . You can simply ignore this and create a new inventory using Add . The Add Inventory form lets you configure settings for the new inventory (Figure 3). The inventory contains all ... 48
69%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue ... 48
69%
Optimization and standardization of PowerShell scripts
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Kheng Ho Toh, 123rf.com
and closing curly brackets is controversial among developers, placing the brackets on a separate line is a good idea (Figure 3). Figure 3: Code clarity ... 48
69%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
of quantum mechanics. [3] [4] Peering inside a D-Wave quantum computer. Thom did shed some light on what kind of problems quantum computers may solve ... 48
69%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
variants: Meltdown-PK on Intel, and Meltdown-BR on Intel and AMD. The rest of the five flaws were related to Spectre. "We evaluate all 7 attacks in proof-of-concept implementations on 3 major processor ... 48
69%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where ... 48
55%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
. Listing 3 Import Trojan Image $ docker load -i nginx-trojan.tar 53bbd7a916c6: Loading layer [==================================================>] 20.48kB/20.48kB The image nginx:latest already ... 52
54%
Samba pitfalls in daily operation
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © lightwise, 123RF.com
with authentication gives you the output from Listing 3. Listing 2 Missing ACL Query Rights root@addc-01:~# samba-tool gpo aclcheck ERROR(runtime): uncaught exception - (3221225506, '{Access Denied ... 52
39%
Fedora Server 30 (x86_64)
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
for cloud and bare metal and bills itself as a secure and easy-to-administer "short-lifecycle, community-supported" operating system [2]. It includes the following features: Linux System Roles [3]: roles ... 52
39%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
source JIT compiler that translates a subset of Python and NumPy [2] code into fast machine code at run time; hence, the "JIT" designation. Numba uses the LLVM [3] compiler library for ultimately compiling ... 52

« Previous 1 2 3 4 5 6 7 8 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice