Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (46)
  • News (4)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 20 Next »

69%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
$ TOKEN=$(kubectl describe secret $(kubectl get secrets | grep default | cut -f1 -d ' ') | grep -E '^token' | cut -f2 -d':' | tr -d '\t'); echo $TOKEN   bTpzZXJ2aWNlYWNjb3VudDpkZWZhdWx0OmRlZmF1b ... 48
69%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue ... 48
69%
Optimization and standardization of PowerShell scripts
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Kheng Ho Toh, 123rf.com
and closing curly brackets is controversial among developers, placing the brackets on a separate line is a good idea (Figure 3). Figure 3: Code clarity ... 48
69%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
of quantum mechanics. [3] [4] Peering inside a D-Wave quantum computer. Thom did shed some light on what kind of problems quantum computers may solve ... 48
69%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
variants: Meltdown-PK on Intel, and Meltdown-BR on Intel and AMD. The rest of the five flaws were related to Spectre. "We evaluate all 7 attacks in proof-of-concept implementations on 3 major processor ... 48
69%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where ... 48
36%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... of machines. Tools such as FAI created for physical machines are of use when deploying virtual machines, as well, as are distro-specific tools (e.g., autoinstall for OpenBSD [2], preseed for Debian [3
28%
Largest Known Prime Number Discovered
15.02.2013
Home »  HPC  »  News  » 
 
, the new primality proof took 39 days of non-stop computing on the PC. This latest discovery brings the total number of known Mersenne primes to 48, and GIMPS, which was founded in 1996, has discovered ... The 48th known Mersenne prime destroys previous record of 12,978,189 digits.
26%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... fails to complete. If the script does not work with your distribution, a manual install will be required [3]. The EasyInstall script has the following prerequisites: Apt or Yum package managers
26%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is not verified. The purpose of this routine is to prevent man-in-the-middle (MITM) attacks. Sake uses the x/crypto/ssh Go package, which is a bit quirky [3]. An issue I stumbled on when testing Sake

« Previous 1 2 3 4 5 6 7 8 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice