Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 147 Next »

30%
Time Protocol Threat Could Allow Login with Expired Passwords
28.10.2015
Home »  News  » 
 
Cisco's Talos threat intelligence service has uncovered a flaw in the Network Time Protocol (NTP) authentication process that lets an attacker force the NTP daemon into pairing with a malicious time ... Timely warning sheds new light on problems with the ubiquitous Network Time Protocol
30%
Intel Unveils New Processor Line
12.07.2017
Home »  HPC  »  News  » 
 
Intel has announced a new line of Xeon processors. According to the company, the Xeon Scalable series is “uniquely architected for today’s evolving data center and network infrastructure.” Like ... Xeon Scalable series offers better performance for networking, virtualization, and storage.
30%
Wireshark 4.4 Released
11.09.2024
Home »  News  » 
 
Version 4.4 of the Wireshark network protocol analyzer has been released with many updates, including improvements to the graphing dialogs and support for Lua 5.3 and 5.4. Additionally, “Wireshark ... See what’s new in the popular network protocol analyzer.
30%
Zarafa And Mandriva Team Up On Groupware
12.05.2011
Home »  News  » 
 
-based web client. With an Active Directory plugin Zarafa can be integrated in existing Windows networks. The Zarafa open source project Z-Push implements compatibility with Microsofts Activesync. ... Both companies collaborate on providing groupware services for Linux and Windows networks.
30%
Security Flaws Found in UPnP
31.01.2013
Home »  News  » 
 
Recent research conducted by Rapid7 reveals that 40 to 50 million network-enabled devices are potentially at risk from vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPn ... Potential risk of network-enabled devices discovered by Rapid7 research.
30%
New Zealand Supercomputer Hacked
04.06.2014
Home »  HPC  »  News  » 
 
the network cable). At this time, it doesn’t appear that the attack reached beyond the supercomputer itself; however, forensics experts are still working on their report. Some news sources have speculated ... Attackers may have wanted access to surrounding network and remote connections.
30%
Half of All iPhones Are Insecure
16.09.2015
Home »  News  » 
 
According to researchers at the security firm Duo Labs, 50% of all iPhones are running an old OS with known vulnerabilities that could compromise a corporate network. Duo's program manager Mike ... Phones with over a 100 known vulnerabilities are common on corporate networks.
30%
Announcing eLxr: Enterprise-Grade Linux for Edge-to-Cloud Deployments
29.07.2024
Home »  News  » 
 
The eLxr project has announced the first release of its open source, enterprise-grade Linux distribution for near-edge networks and workloads. According to the project website, eLxr provides ... The Debian-based distribution provides a single solution for edge networks.
30%
$5.3 Million NSF Grant for Cyberinfrastructure Research
12.03.2014
Home »  HPC  »  News  » 
 
The US National Science Foundation (NSF) has awarded a grant of $5.3 Million to establish a network of Advanced Cyberinfrastructure and Education Facilitators (ACI-REFs). A project team at Clemson ... New network will extend the benefits of cluster computing to more scientists.
30%
Intruders Use Draft Email Messages for Attacks
11.11.2014
Home »  News  » 
 
network security systems watch closely for command and control messages that might indicate an attack underway. By hiding the commands in email drafts, the attackers circumvent defense techniques ... New technique circumvents defenses by avoiding conventional network traffic.

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice