Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 133 Next »

16%
Telegram Accounts Hacked in Iran
03.08.2016
Home »  News  » 
 
authentication, that can compromise your account. This is not the first time Telegram has been under fire. Last year, security researchers pointed out many security issues affecting the service.
16%
DeepLocker: An AI Powered Malware
14.08.2018
Home »  News  » 
 
point of DeepLocker is to change the perception of the security community to face a new breed of AI powered malware. “We can’t, as an industry, simply wait until the attacks are found in the wild to start
16%
When you should and should not use NoSQL databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Artem Gavrysh on Unsplash
for tables. One problem that vector databases solve, for example, is data dimensions. They handle data defined as vectors, which you can imagine as arrows in three-dimensional space. The arrows point from
16%
TCP Fast Open
05.03.2013
Home »  Articles  » 
 
order and to detect duplicates); there is still no exchange of payload data. In principle, the RFCs that define TCP (RFC793 and RFC1323) allow the transfer of payload data at this point, but the data
16%
Secret Sauce
09.11.2017
Home »  Articles  » 
supports ISO C++ standards, including C++11, C++14, and some C++17 features. This multilanguage support offers a point of entry for programmers from many diverse platforms and environments, providing access
16%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
architecture. Some examples of algorithms in this class, among others, are: Numerical integration – by slice Monte Carlo methods – by sample The Mandelbrot set – by function point Ray tracing
16%
Software-defined wide area networks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © ktsdesign, 123RF.com
connections). Examples of underlay networks include private multiprotocol label-switching (MPLS) networks leased from providers, directly leased point-to-point routes, and simple xDSL (i.e., ADSL, SDSL, etc
16%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
that an implementation was hardly practical. From the findings of the initial attacks on SHA-1, NIST nevertheless promptly recommended that SHA-2, a SHA-1 successor, be used from that point on. SHA-2 was published back
16%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
-ng as a precise benchmark on the project's web page, but he also points out that these metrics can be useful to monitor relative regression between operating system (OS) versions, particularly when used on the same
16%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
Critical Linux Kernel Bug Discovered Security researchers at Perception Point Software have identified a zero-day privilege escalation vulnerability in the Linux kernel. According to the report

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice