Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 有人会查通话记录的-(⏭查询网站gpio17.com⏮)-微信和朋友的通话记录怎么查-查通话记录不要验证码-可以查座机的通话记录吗-(⏭查询网站gpio17.com⏮)-移动和信可以查通话记录吗67 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (910)
  • Article (65)
  • News (8)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 99 Next »

82%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
to the NVDIMMs. If you also want to bypass the kernel, then check out the NVM Library (NVML) project [7]. The library for C and C++ abstracts the specifics of NVDIMMs for the programmer and thus supports direct
82%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
://en.wikipedia.org/wiki/Ken_Thompson Thompson on security: https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf Tor developers lecture: https://www.youtube.com/watch?v=5pAen7beYNc Gitian: https://gitian.org Gitian
82%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
is able to get valid AWS credentials to log in to the account by phishing an internal user [7]. The compromised user has misconfigured attached IAM policies, which lets the attacker edit the Assume
82%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
for RHEL 7: https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html Lynis: https://cisofy.com/lynis/ FireHOL Cybercrime IP feeds: https://iplists.firehol.org Fail2Ban: https://github.com
82%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
of prebuilt agents and, assuming you have some knowledge of Ruby, you could write your own agents with additional functionality. The MCollective website offers exhaustive examples [7] to help you do so
82%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Sergey Peterman, 123RF.com
://sourceforge.net/projects/burp/?source=directory AIK for Windows 7: http://www.microsoft.com/en-us/download/details.aspx?id=5753 Backshift: http://stromberg.dnsalias.org/~strombrg/backshift/ Pypy: http://pypy.org/ Obnam: http
82%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
and OpenSSH: http://www.youtube.com/watch?v=7CadOVTNxr4 Bridge SPA: http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf Knockknock: http
82%
Web-based reconnaissance
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Wayne Daniels, 123RF.com
, including antifraud and antiphishing services, application testing, and PCI scanning, and the netcraft plugin harvests hosts from netcraft.com (Figure 3; no new hosts were found), whereas the shodan
82%
Oracle Database 12c: Cloud computing with multitenant architecture
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Jakub Jirsak, 123RF.com
.820013801 DATA01/CDB1/DATAFILE/sysaux.257.820013845 DATA01/CDB1/DATAFILE/undotbsl.259.820013893 DATA01/CDB1/DATAFILE/users.258.820013891 DATA01/CDB1/DD7C48AA5A4404A2E04325AAE80A403C/DATAFILE/sysaux.265
82%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
/engine/security/security/ "Are Docker containers really secure?" by Daniel J. Walsh: https://opensource.com/business/14/7/docker-security-selinux SELinux: https://selinuxproject.org/page/Main_Page Stop disabling SELinux

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice