Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

16%
News for Admins
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
 
/content/www/us/en/security-center/advisory/intel-sa-00532.html), labeled as a medium threat, is much more widespread and could lead to denial of service due to insufficient control flow management. This vulnerability affects numerous products ranging from
16%
Configuring complex environments
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Austin Neill on Unsplash
Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He is a regular speaker at various international conferences and writes a lot
16%
Laying out documents with Markdown and Pandoc
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Edgar Chaparro on Unsplash
: https://goessner.net/articles/slideous/ reveal.js: https://revealjs.com The Author Thorsten Scherf is the global Product Lead
16%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
programs are necessary on the ESXi server [2]. This attitude not only leads to inadequate protection against attacks, but also to failures in detecting successful attacks. It also follows that, from
16%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He is a regular speaker at various international conferences and writes a lot
16%
What's New in NetworkManager
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Anukrati Omar on Unsplash
://www.freedesktop.org/software/systemd/man/systemd.network.html The Author Thorsten Scherf is the global Product-Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He
16%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
or the weakest link. Instead, as it turns out, they are simply the preferred attack vector today. Problems such as phishing, wherein crooks lure the user to a fake website to grab credentials, can always lead
16%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
, automatically added rules (e.g., those created by the Docker daemon) always lead to side effects in manually or semi-automatically created rulesets. The bigger security problem, however, arises when a rule
16%
Regular expression security
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Jakub Jirsak, 123RF.com
(.) for all possible input symbols lead to very large state machines. Attack with ReDoS A state machine's performance when checking regular expressions depends on many factors: the size of the state machine
16%
Open source tools for workgroup collaboration
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
introduces a few of the leading alternatives, including: RetroShare SparkleShare I2P These tools provide collaboration and data sharing for dispersed workgroups and offer some advanced security

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice