Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 149 Next »

15%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
communications. In doing so, the attacker does not have to redirect the traffic completely or impersonate the data target. Instead, they can sniff the data on the network and then let it continue to the intended
15%
Connecting Windows Server 2016 with Azure
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Yannick Pulver on Unsplash
to each other through virtual networks or to the local network to create a hybrid cloud that supports Windows Server 2016 features. Such a cloud could be managed with System Center Virtual Machine Manager
15%
Supercomputers Take Down Ecological Theory
22.10.2015
Home »  HPC  »  News  » 
 
The Botanical Information and Ecological Network (BEIN), working with the iPlant Collaborative and the Texas Advanced Computing Center (TACC), has overturned a popular theory in ecology
15%
Bleedingbit: Two New Bluetooth Vulnerabilities
06.11.2018
Home »  News  » 
 
enterprises using vulnerable access points in their networks. Beyond access points, the health sector is potentially affected by these vulnerabilities, because the affected BLE chips are used in many medical
15%
Deadlines Extended for SuperComputing Asia
06.12.2018
Home »  HPC  »  News  » 
 
and System Software Architecture, Network, Communications, and Management See the Call for Papers for more on submission requirements.
15%
New Mirai Botnet Variant Discovered
27.03.2019
Home »  News  » 
 
hosting provider OVH and DNS provider Dyn. The new variant targets embedded devices like routers, network storage devices, NVRs, and IP cameras. Unit 42 found this new variant targeting enterprise We
15%
Overview of Automation Engineering
02.09.2022
Home »  News  » 
 
:  Infrastructure  Networking Cloud provisioning Application deployment Configuration management Learn more at FOSSlife.
15%
10 Ways to Use Event-Driven Ansible
09.03.2023
Home »  News  » 
 
describes 10 ways you can apply Event-Driven Ansible for tasks related to networking, DevOps, and more, including: User request management Security automation Installation and provisioning
15%
CISA Warns of Widespread Exploitation of Known Confluence Vulnerability
18.10.2023
Home »  News  » 
 
Confluence administrator accounts,” and network administrators are urged to patch the flaw immediately. Read more at Decipher.            
15%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
if something bad occurs. Given that most enterprise networks have hundreds or thousands of networked information systems, vulnerability analysis and assessment by manual methods are virtually impossible

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice