Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (590)
  • Article (186)
  • News (70)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 85 Next »

48%
If You Don't Like Security Guys, Call a Hacker
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
't (pardon the pun) hack it in the real world of real threats and real thefts. In the world of advanced persistent threats, you need advanced persistent protection, and that can only be had from someone who
48%
Security is Everyone's Problem
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Rancz Andrei, 123RF.com
back. When we headed back to the office, I said, "Do you know what my one takeaway from that seminar was? That security is not an IT problem." We all laughed and had a good time ribbing the Security
48%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
When Red Hat took over Inktank Storage in 2014, thus gobbling up the Ceph [1] object store, a murmur was heard throughout the community: on the one hand, because Red Hat already had a direct
48%
Artificial Intelligence in Review
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © altitudevisual, 123RF.com
, and Klimt's The Kiss . Only the act of falling in love or losing a loved one can inspire the human heart to write great song lyrics. Remember that artificial intelligence is artificial. If it had existed 1,000
48%
Linux apps on Windows 10 and Chrome OS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Cornelius, Fotolia.com
or develop scripts and applications yourself, you do not necessarily have to set up a full-fledged virtual or even physical system. Instead, you can set up a Microsoft or Google Linux subsystem. WSL Version 2 ... Microsoft and Google have upgraded their in-house operating systems, Windows 10 and Chrome OS, with subsystems to run Linux. We look into their highly different approaches. ... MS and Google Linux Subsystems
48%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
drafts. When we inquired about this, the IETF replied that the standardization drive had terminated in 2003. Perhaps talking to NDMP.org would reveal more, they suggested. But questions we sent
48%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
is to enable your users, not constrain them. In the "old" days of the 1990s, we thought we had to lock down our users and jail them to protect them from themselves. Falsely, we were protecting our jobs. We didn
48%
BlackHat USA 2010
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
BSD has had remarkable success). However, you then come to the BlackHat conference and see a presentation like "HTTPS Can Byte Me," in which Robert Hansen and Josh Sokol disclosed 24 vulnerabilities (Figure
48%
Welcome
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © nexusplexus, 123RF.com
bodes well for the support staff subjected to the madness that follows. I was on a project a few years back that used a commercially supported Linux distribution that had some limitations in some
48%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
described by Rizzo and Duong took advantage of the fact that the vulnerable applications encrypted confidential information and forwarded it to the browser. The developers of the vulnerable applications had

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice