Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 160 Next »

38%
Dangerous New Attack Could Compromise One Third of All HTTPS Servers
01.03.2016
Home »  News  » 
 
-0800) is a cross-protocol attack that exploits flaws in the SSLv2 protocol. The attacker must passively observe around 1,000 TLS handshakes and initiate roughly 40,000 probe connections, performing computations
38%
Jeep Cherokee Hacked Again
03.08.2016
Home »  News  » 
 
way to compromise a 2014 Jeep Cherokee or other FCA US vehicles." Although this hack did require physical access to the car, it does demonstrate a potential for hacking cars through the OBD dongles
38%
Serious Bug Found in Ubuntu
21.12.2016
Home »  News  » 
 
is installed by default on all Ubuntu systems after 12.10, which also includes forks like Linux Mint. If you are using any Ubuntu-based distribution, you are vulnerable. The hole has been patched, but it does
38%
Free Tool To Decrypt WannaCry Ransomware
23.05.2017
Home »  News  » 
 
of the RSA private key that are used by WannaCry. “It does so by searching for them in the wcry.exe process. This is the process that generates the RSA private key. The main issue is that the Crypt
38%
SELinux Systems Vulnerable to sudo Vulnerability
06.06.2017
Home »  News  » 
 
a vulnerability in sudo's get_process_ttyname() for Linux. “On an SELinux-enabled system, if a user is Sudoer for a command that does not grant him full root privileges, he can overwrite any file
38%
Red Hat Starts Containerizing Its OpenStack Platform
06.11.2017
Home »  News  » 
 
offerings to the market faster, because today’s organizations need a cloud infrastructure that can allocate resources quickly, efficiently, and at scale. “Running OpenStack services on Linux containers does
38%
We Are Under Bad Rabbit Attack
25.10.2017
Home »  News  » 
 
a computer and restricts user access to the infected machine until a ransom is paid to unlock it. US-CERT discourages individuals and organizations from paying the ransom, as this does not guarantee
38%
AMT Flaw in Intel Chips Allows Attacker to Create a Backdoor
16.01.2018
Home »  News  » 
 
would dismiss such flaw as a real threat because it does require ‘physical’ access to the target device. Sintonen said it’s not that hard. Once the attackers identify the victim, they approach the victim
38%
More than 2000 WordPress Sites Infected by Malware
31.01.2018
Home »  News  » 
 
the new attack is not as widespread as the original, the return of the malware does show that website admins didn’t protect their sites after the first attack. It’s very likely that most WordPress admins
38%
US Government Shutdown Ties Up $139.2 Million in Grant Funding
07.02.2019
Home »  HPC  »  News  » 
 
awarded during a similar period a year ago. The ASBMB page does not discuss the effects of the funding delay. The money has already been allocated by the Congress, so grant agencies could theoretically

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice