Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 200 Next »

13%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
and provides some functionality that Vi cannot, so if you have learned Vi, you already know some ex commands. You can start ex on the command line in most Linux distributions by simply typing ex
13%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services
13%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
solutions such as Rsync came into play. However, Rsync requires a functioning network connection between systems. A company laptop that has to be connected to the VPN to get an Internet connection does
13%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
development framework for the ESP32 series of microcontrollers providing libraries, tools, and sample code for developing applications on the ESP32 MCU. This module lets you flash and debug the Flipper Zero
13%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
usage model (workflow) and provide several performance data viewing options. Open|SpeedShop uses both statistical sampling and traditional tracing techniques to record performance information
13%
Jeep Cherokee Hacked Again
03.08.2016
Home »  News  » 
 
. Unlike their previous hack, which was executed remotely, the new hack requires physical access to the car. Miller and Valasek plugged in their laptops to the OBD (the diagnostic port of the car
13%
Mind the Gap
14.02.2018
Home »  News  » 
 
virtually any desktop PCs, servers, laptops, embedded systems and other devices." Guri said that while everyone was talking about breaking the air gap to get in, no one considered getting the information out
13%
Intel Chips Smashed by PortSmash
06.11.2018
Home »  News  » 
 
of the most popular Intel platforms, Kaby Lake and Skylake, which power most modern PCs, including laptops, desktops, and servers. All of these devices are vulnerable to attacks. In a security advisory, Red
13%
Thunderspy Vulnerability Hits Linux
14.05.2020
Home »  News  » 
 
), says, “all the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop.” Jerry
13%
Linux 5.8 Kernel Gains a Notification Queue
15.06.2020
Home »  News  » 
 
the desktop has to poll for it - not so good on a laptop. This facility will allow the desktop to avoid the need to poll." The official overview of the notification queue (for it's proposal in kernel 5.7) sums

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice