Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 58 Next »

32%
Opportunities and risks: Containers for DevOps
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ping Han, 123RF.com
to the OverlayFS mount (Figure 2). Figure 2: With OverlayFS, containers can use their host filesystem, and the OverlayFS driver stores the changes in a separate
32%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
Copilot is integrated as part of Windows 11 22H2 Moment 4 or Windows 11 23H2. As with all new functions, Microsoft does not enable new services on all computers at once, but in several steps
32%
Public key infrastructure in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Tsung Lin Wu, 123RF.com
-to-machine (M2M) communication, device certificates, or TLS encryption in the IoT area. One example is the healthcare industry where countless IoT use cases illustrate the need for PKI as a Service (PKIaa
32%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
programs are necessary on the ESXi server [2]. This attitude not only leads to inadequate protection against attacks, but also to failures in detecting successful attacks. It also follows that, from
32%
News for Admins
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
 
Canonical Now Offers an Ubuntu Pro Image for AWS Ubuntu rules the cloud. According to The Cloud Market (https://thecloudmarket.com/stats#/by_platform_definition), Ubuntu is the most widely used
32%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
system. The bug called "Absolute Path Traversal" bug (CVE-2018-20250) is found in a UNACEV2.DLL, a third-party library. It allows attackers to extract a compressed executable file from the ACE archive
32%
Software inventory with PowerShell
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Andrea De Martin, 123RF.com
). Figure 1: PowerShell PackageManagement module commands. The Get-Package cmdlet displays all the installed software packages (Figure 2). The source and the repository are initially irrelevant. However
32%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
and useful docs in the GitHub page README file, you'll also appreciate the slick introduction on a single-page website [2] that has a simple and effective example (before pointing you back to the Git
32%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
is mandatory access control (MAC). Here, access is granted on the basis of a set of rules. The disadvantage of this method is that such rules must be defined within the application, resulting in greater
32%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
Headquarters (GHCQ) supposedly gained access to SIM cards [1] from Gemalto, allowing them to access any cell phone communications that used these cards. Another story talks about how Lenovo installed malware [2

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice