Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 171 Next »

23%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
your bespoke needs once it has been applied. The security suite's Compliance feature has been officially certified by my favorite benchmark, CIS [4], which are consensus-based, industry-respected guides
23%
Orion software development environment
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © route55, 123RF.com
. Beyond Orion More details about Orion can be found in the documentation [4], which you might notice is outdated (e.g., when it mentions Java 1.6 as a mandatory requirement). However, this does not mean
23%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
problems on Open Systems Interconnection (OSI) model Layer 2 or 3 is almost trivial compared with VoIP analysis. In Internet telephony, the sources of error migrate to higher OSI Layers 4 through 7. Vo
23%
A REST interface for FreeIPA
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © P.Gudella, 123RF.com
interface since FreeIPA version 4.2 (Figure 1). Otherwise, it is also possible to invoke the ipa tool in verbose mode (-vv option). The output shows the method used, along with the parameters (Listing 1
23%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
takes place. Among others, the software helps combat the ransomware variants Locky, CryptoWall4, CryptoLocker, TeslaCrypt, and CTB-Locker. Conclusion The year 2016 started off early with the first big
23%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
implementation [4]. Google recorded a 45% year-on-year increase in the use of Chrome's WebRTC features in 2017, at a run rate of 1.5 billion minutes in a week. This number is huge but still miniscule compared
23%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
team simply registered the previously unregistered domain. At the time, the analysis team did not even know exactly what would happen [4]. Conclusions Sandboxes allow the dynamic analysis of malware
23%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
a runtime named runC to run the container. This prototype of an OCI-compliant container runtime [4] was developed by Docker; however, one major problem has still not been solved by the introduction of the OCI
23%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
and free memory, including buffer/cache allocations [4] and the state of swap [5]. Most useful is the avail Mem field, which estimates memory available to new processes without making use of swap. Unlike
23%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
five years, and it affects devices with Qualcomm processors running Android 4.3 and older Android systems. Devices running newer versions of Android take advantage of Security-Enhanced Android (SE

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice