Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (258)
  • Article (70)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 33 Next »

57%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
: Katacoda has a learning scenario in which you can enter commands. Source: katacoda.com [8]. In the left pane, the note under Task explains that you need to restart the CRI-O runtime to fix a bug
57%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
is then given a new shell from jamesvb1 , which DNS identifies as s1.stangernet.com . Figure 8: The attacking system. Figures 9 and 10 show another sequence
57%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
M Ocean SDK: https://github.com/dwavesystems/dwave-ocean-sdk Leap: https://www.dwavesys.com/press-releases/d-wave-launches-leap-first-real-time-quantum-application-environment Oak Ridge
57%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
of this article, note that I'm not a security or cryptography expert, nor do I play one on TV. Please do your own research. That said, in the sections below, I review a few file encryption/decryption tools
57%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
8.04 system maintained by the Metasploit project. Information Gathering Once the intruder logs in with a low-end user account, the first step is to get some information about the system and rights
57%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
1 $39.99 $39.99 ZION XON-720P mATX/ITX slim desktop case 300W power supply 1 $34.99 $34.99 250GB SATA 3.0Gbps disk — 1 $59
57%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
Network Coordination Centre (NCC) [4] is responsible for the European arena. In addition to ASNs, RIRs register the IP address spaces (prefixes) of their members. Well-known examples are the prefixes 8.8.8.0
57%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
the country code as the source instead of an IP address. For example, a block for Somalia implemented by iptables is: iptables -A INPUT -m state --state NEW -m geoip --source-country SO -j DROP Depending
57%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
. This processor has eight cores running at 1.35GHz, reaching a theoretical peak of 172.8GFLOPS but using only 40W of power. Other interesting new chips combine a classic CPU with an accelerator on a single chip
57%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
no overview of supported providers in the documentation. Outlook itself can be restricted significantly by applying rule 26190899-1602-49E8-8B27-EB1D0A1CE869 when creating child processes. Different rules

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice