Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 99 Next »

16%
SSH Comes to Windows PowerShell
22.05.2018
Home »  News  » 
 
strategy is to bake those capabilities in the PowerShell, the Windows command-line interface. Today, Windows 10 users can easily ‘ssh’ into their remote Linux systems using a native Windows SSH client. Now
16%
Routers Remain Top Target for IoT Attacks, Per Zscaler Report
10.11.2025
Home »  News  » 
 
methods include command injection and directory traversal techniques, which “often exploit unauthenticated remote code execution (RCE) vulnerabilities, such as CVE-2016-10174 and CVE-2018-10561 that allow
16%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
security elements], smart cards, and NFC). Today, you can even see it working with supported devices such as the Lenovo Laptop fingerprint reader and the Samsung Galaxy S3. FIDO alliance's efforts to build
16%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
VirtualBox on a laptop (Linux Mint Ubuntu 16.04 derivative) with UEFI, I had to install a new Machine Owner Key (MOK) after a reboot. To do this, I set a password for the VirtualBox package at installation
16%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
packages, entering python3 instead of python will output the following: $ python3 --version Python 3.5.2 On Debian derivatives (I'm using Mint/Ubuntu on my laptop), you can use the following commands
16%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
, then an old laptop is probably better suited than a VM, because it avoids the virtualization layer between Kali and the network. Three Applications Once Kali is running, the tools can be divided roughly
16%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services
16%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. If the company's own service laptop breaks down, an employee is practically unable to work until they are issued replacement hardware that is allowed to talk to the VPN
16%
Stressing security with PowerShell
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Freya Sapphire, Photocase.com
. The information is used to maintain permanent access to the system in line with the attacker's requirements. The system can be compromised by exploiting existing vulnerabilities in the remote configuration
16%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
The Remote Authentication Dial-In User Service (RADIUS) protocol plays a central role in user authentication in many companies. The client-server protocol is used for user and computer

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice