Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 108 Next »

13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
and started scanning around on the training cloud at Hetzner with a slightly off netmask. Within minutes, the monitoring tools identified this undesirable behavior and simply shut down the training network
13%
Managing networks in Windows Server vNext
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Shawn Hempel, 123RF.com
The Windows Server Network Controller enables centralized management, monitoring, and configuration of network devices on Windows Server. Network Controller is designed to offer the same functions
13%
Handy Windows tools for sniffing network traffic
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Barna Tanko, 123RF.com
Sometimes you just need a quick answer and don't want to slow down to spin up a big, complicated monitoring application. If you work on a Windows network, three useful tools for sniffing traffic
12%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
and more than 1PB of data? Moreover, the answers constantly change because users are adding, modifying, and deleting data, but understanding – or at the very least, monitoring – your filesystem holistically
12%
Jeep Cherokee Hacked Again
03.08.2016
Home »  News  » 
 
. Unlike their previous hack, which was executed remotely, the new hack requires physical access to the car. Miller and Valasek plugged in their laptops to the OBD (the diagnostic port of the car
12%
Mind the Gap
14.02.2018
Home »  News  » 
 
virtually any desktop PCs, servers, laptops, embedded systems and other devices." Guri said that while everyone was talking about breaking the air gap to get in, no one considered getting the information out
12%
Intel Chips Smashed by PortSmash
06.11.2018
Home »  News  » 
 
of the most popular Intel platforms, Kaby Lake and Skylake, which power most modern PCs, including laptops, desktops, and servers. All of these devices are vulnerable to attacks. In a security advisory, Red
12%
Thunderspy Vulnerability Hits Linux
14.05.2020
Home »  News  » 
 
), says, “all the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop.” Jerry
12%
Linux Kernel 5.13 Has Been Released
28.06.2021
Home »  News  » 
 
support, early support for Wireless Wide Area Networks, Microsoft's Azure Network Adapter, Advanced Configuration and Power Interface spec for laptops, early work for Arm64 Hyper-V guests, RISK
12%
Linux Kernel 5.17 Has Finally Arrived
23.03.2022
Home »  News  » 
 
, support for custom fan curves for some ASUS ROG laptops, a new driver for x86 Android tablets, support for Intel's new "platform firmware runtime update" (which allows for partial firmware updates without

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice