Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (278)
  • Article (139)
  • News (41)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 46 Next »

20%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
, represents Unix time (i.e., the number of seconds since January 1, 1970, 0:00 hours). It is multiplied here by 1,000 to obtain the value in milliseconds needed by Cassandra. Also bear in mind that this time
20%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
, revenue DECIMAL(11, 2) 05 , customer_class CHAR(1) 06 ); 07 08 SQL> INSERT INTO customer 09 VALUES (1, 2016, 100.0), (2, 2016, 0.0), (3, 2016, 999.99); 10 SQL> INSERT INTO customer 11 VALUES (1, 2017, 500
20%
Jeep Cherokee Hacked Again
03.08.2016
Home »  News  » 
 
. Unlike their previous hack, which was executed remotely, the new hack requires physical access to the car. Miller and Valasek plugged in their laptops to the OBD (the diagnostic port of the car
20%
Mind the Gap
14.02.2018
Home »  News  » 
 
virtually any desktop PCs, servers, laptops, embedded systems and other devices." Guri said that while everyone was talking about breaking the air gap to get in, no one considered getting the information out
20%
Intel Chips Smashed by PortSmash
06.11.2018
Home »  News  » 
 
of the most popular Intel platforms, Kaby Lake and Skylake, which power most modern PCs, including laptops, desktops, and servers. All of these devices are vulnerable to attacks. In a security advisory, Red
20%
Thunderspy Vulnerability Hits Linux
14.05.2020
Home »  News  » 
 
), says, “all the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop.” Jerry
20%
Linux 5.8 Kernel Gains a Notification Queue
15.06.2020
Home »  News  » 
 
the desktop has to poll for it - not so good on a laptop. This facility will allow the desktop to avoid the need to poll." The official overview of the notification queue (for it's proposal in kernel 5.7) sums
20%
Linux Kernel 5.13 Has Been Released
28.06.2021
Home »  News  » 
 
support, early support for Wireless Wide Area Networks, Microsoft's Azure Network Adapter, Advanced Configuration and Power Interface spec for laptops, early work for Arm64 Hyper-V guests, RISK
20%
Linux Kernel 5.17 Has Finally Arrived
23.03.2022
Home »  News  » 
 
, support for custom fan curves for some ASUS ROG laptops, a new driver for x86 Android tablets, support for Intel's new "platform firmware runtime update" (which allows for partial firmware updates without
20%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
of laptops have been discovered to be vulnerable to attack. The security research group Eclypsium has discovered (https://eclypsium.com/2020/2/18/unsigned-peripheral-firmware/) that hardware made by Dell, HP

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice