Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (975)
  • Article (311)
  • News (194)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 149 Next »

15%
Dell Systems Ship with Faulty Root Certificate
24.11.2015
Home »  News  » 
 
Several news sources report that users have discovered a preinstalled digital certificate shipped with Dell Inspiron 5000 series notebooks and the XPS 15 model laptop that could allow an attacker
15%
Intel Has a Serious Remote Management Problem
10.05.2017
Home »  News  » 
 
affects every laptop, PC, and server that has Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), or Intel Small Business Technology (SBT) features enabled. Intel Macs do not ship
15%
New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
21.05.2019
Home »  News  » 
 
Researchers have released info on a new class of flaws in Intel CPUs that affects every processor made since 2011. “ZombieLoad attack affects a wide range of desktops, laptops, and cloud computers
15%
Fedora 33 Desktop Defaults to Btrfs
13.07.2020
Home »  News  » 
 
this change will go smoothly. To this point, the Fedora developers have said: For laptop and workstation installs of Fedora, we want to provide file system features to users in a transparent fashion. We want
15%
Risky Business
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Oksana Stepanenko, 123RF.com
. Before having cloud applications to manage my passwords, infrastructure, backups, contacts, mobile applications, and creative application suite, I had to carry around a fully loaded laptop computer
15%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
are not sure what board you have installed, or you use a laptop with a motherboard designed specifically for mobile use, simply press the OK button to enable the first list entry, Run_sensors-detect . Your
15%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
servers have long been a worthwhile target for attacks, such as the Li0n worm, which exploited a vulnerability in BIND. Moreover, DNS servers of all kinds are often used as amplifiers in distributed denial
15%
GUI or Text-Based Interface?
05.12.2018
Home »  HPC  »  Articles  » 
. User Interface About everyone in the world uses a graphical user interface (GUI) to access their desktops, laptops, and mobile devices. The icons and visual indicators of the interface, with some text
15%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
email to an employee with malware attached. Alternatively, they could infect the laptop of a sales representative outside the protected network with malware that works its way through a local server when
15%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
node when their laptop or desktop doesn't have the resources they need. The combination of MATLAB, one of the most powerful science and engineering tools, along with single servers with many GPUs (more

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice