Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (156)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 109 Next »

13%
New Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
21.05.2019
Home »  News  » 
 
Researchers have released info on a new class of flaws in Intel CPUs that affects every processor made since 2011. “ZombieLoad attack affects a wide range of desktops, laptops, and cloud computers
13%
Fedora 33 Desktop Defaults to Btrfs
13.07.2020
Home »  News  » 
 
this change will go smoothly. To this point, the Fedora developers have said: For laptop and workstation installs of Fedora, we want to provide file system features to users in a transparent fashion. We want
13%
Risky Business
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Oksana Stepanenko, 123RF.com
. Before having cloud applications to manage my passwords, infrastructure, backups, contacts, mobile applications, and creative application suite, I had to carry around a fully loaded laptop computer
13%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
} tc [-force] -batch filename where OBJECT := { qdisc | class | filter | chain | action | monitor | exec } OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[aw] | -o[neline] | -j
13%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
-in in the desktop Linux world. The Linux Mint site was hacked earlier this year. Zero Day UEFI Exploit Affecting Lenovo, HP, and Gigabyte Laptops Dmytro Oleksiuk, a security researcher, has discovered a zero
13%
Transcoding optical media in Linux
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Pavol Stredansky
for playback on high-resolution 3K or 4K monitors. Figure 2: The HandBrake program window offers numerous options. Here, you also set the refresh rate
13%
Even benchmarks can be easy to handle
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
platforms. As you go through stress's options, you can visualize its effect on the system via Byobu's [3] status line, the Gnome System Monitor [4], the handy top [5], or Apple Activity Monitor on a Mac[6
13%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
sticks, and laptops, but as hard as we tried, at some point, we didn't have access to those SSH keys in the middle of night, which meant an emergency couldn't be dealt with without harassing other members
13%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
Stax Insights [3]. The former enables flexible scalability in Cassandra clusters and consumption-based billing supported by the stability and performance enhancements of DataStax Enterprise, which monitors
13%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
that is able to download the entire AIX Toolbox. Often administrators will use their local PC or laptop to achieve this task (or even use the wget -m command from their Linux or Mac laptop). They then have

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 109 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice