Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1060)
  • Article (311)
  • News (197)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 158 Next »

11%
Run applications in a containerized sandbox with Firejail
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Victor Zastolskiy, 123RF.com
then be propagated to sub-namespaces. The cgroups namespace supports abstracting control groups, namespaces, or both. The time namespace, which was only released in 2020 with kernel 5.6, cannot abstract real time
11%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
6th Gen to 10th Gen Core CPUs and a number of Xeon processors. Some Intel-based systems have begun shipping (since Jan 2022) with the new microcode for both Intel Core and Xeon processors.
11%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
significantly more resources, which means that the scope of this attack is quite remarkable. According to Cloudflare, the botnet used for the attack consisted of 6,000 unique bots from 1,300 different networks
11%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
not allowed RSA keys that use SHA-1 for signing since version 8.8 [6]. If you still want to use the RSA algorithm for the host key of an SSH server, it must be used together with a hash algorithm from the SHA
11%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
on an asymmetric Diffie-Hellmann key exchange [6], but unlike PKINIT, no additional infrastructure in the form of a public key infrastructure (PKI) is required. Since MIT Kerberos version 1.14, the library has also
11%
The weak spot of SBCs
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Lucy Baldwin, 123RF.com
at the command line if using some care. Figure 3: The gnome-disks read benchmark on a SanDisk A1 U1 card. Entering dd [6] to a valid path on the filesystem
11%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
the following command with swap turned off (swapoff -a) and watch the fireworks: stress-ng --brk 2 --stack 2 --bigheap 2 Colin has presented his work at several Linux Foundation events, and slides [6
11%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
to receive such a match expression. The Python enhancement proposal (PEP) 634 [4] describes the implementation. More information about the plans can be found in PEP 635 [5] and PEP 636 [6]. How pattern
11%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
Emergency Readiness Team (US-CERT), for example, recommends the 3-2-1 backup principle [6]: three copies of the data, one production copy, and two backups, divided between two different media (e.g., hard
11%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
methods are suitable for finding credentials in the wild. For instance, intruders can use a tool called shhgit [6] to find secrets and sensitive files across GitHub code. The attacker can now send a fake

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 139 140 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice