Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 208 Next »

12%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
successful. Spam fax messages are another creative form of attack. At first glance, the matching and deceptively realistic fax by VoIP provider sipgate attempts to deceive the user and motivate them to open
12%
Targeted attacks on companies
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Ildar Galeev, 123RF.com
with a high security level with this method of attack. In addition to attacks on employees and business partners, service providers with a low security level are also targeted. To protect against this type
12%
News for Admins
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
not happy with Google's disclosure. But it's debatable whether such exploits should be patched immediately or companies should wait for their regular update cycle. To Google's defense, the company provided
12%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
're running a single LEMP (Linux, Nginx, MySQL, PHP) website that sometimes needs to scale up for busy periods, containers can provide with relative ease the software dependencies you need across all stages
12%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
. The ultimate solution is to use dedicated hosts, a facility providing complete control of your instance placement but at an additional cost. The House of Mac Unlike the Linux version, the Mac OS version of top
12%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
takes some getting used to; for example, the term Manager is used for Computer, and Worker is used for Thread. Iometer can be used on Windows and Linux and provides a graphical front end, as shown
12%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
. Project Abacus provides authentication through the way you use your device. Google's machine-learning capabilities can identify you by learning the way you interact with your phone: the way you type
12%
Affordable hardware switch for SDN
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © plus69, 123RF.com
image. It is not possible to complete a command with [Tab] or display the options with [?], as admins are accustomed to doing with other devices. The CLI does provide a help command. You can switch
12%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
with network namespaces: ethtool, iproute2 (which also provides the ip management tool), iw for wireless connections, and util-linux. Using namespaces is easy. For example, a very simple, isolated DNS resolver
12%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
security measures can only provide limited protection. Awareness on the part of individual users is crucial. Whenever possible, users should validate the sender, subject, and plausibility, before opening any

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice