Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"5432%2000s Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (273)
  • News (38)
  • Article (36)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 Next »

21%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
code is also available. Yara, which received some attention for its role in finding and defeating a Trojan called BlackEnergy, may have had its 15 minutes of fame around 2013 or 2015. But malware
21%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
, and activities. Outlook online and Outlook as of version 2013 directly show you notices relating to rule violations (Figure 5). On the one hand, you get to see the unauthorized recipient, and on the other, you can
21%
Setting up Google Apps for Work
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Galina Peshkova, 123RF.com
Server 2003 to 2013, and Office 365. Select IMAP server for accounts for which Google doesn't offer a specific migration agent. You don't need an additional client on the source system with all sources
21%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
2001:db8::201:203:409 prefixlen 64 scopeid 0x0 inet6 2001:db8::5555 prefixlen 64 scopeid 0x0 inet6 fe80::1:2ff:fe03:409 prefixlen 64 scopeid 0x20 ether 02
21%
Established container solutions in Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © dixiland, Photocase.com
2.0. Websites with Flash were spectacular and the exception rather than the rule. At the time, not everybody needed their own website, and especially not their own (virtual) server. People who wanted
21%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
like AIX, HP-UX, and Solaris can be tested with InSpec. Additionally, InSpec works on Mac OS X. The supported systems are so diverse, almost all applications in the server room can be supported
21%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
Foundation since 2013. It is a scalable open source tool that focuses on real-time analysis of large amounts of data. Whereas Hadoop primarily relies on batch processing, Storm is a distributed, fault
21%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
.social-engineer.org/framework/general-discussion/social-engineering-defined "Using empathy to use people: Emotional intelligence and manipulation" by Jamil Zaki, November 7, 2013: https://blogs.scientificamerican.com/moral-universe
21%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
time relative to Docker. Docker Dominance The first version of Docker [1] was released March 20, 2013. Although containers had already been available on Unix-like systems for a few years, Docker
21%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
: The focus is obviously not on testing server applications; it is on the very powerful tools for testing things like WiFi networks. An RPi4 can be used with a large power bank (about 20,000mAh) for quite

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice