Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 186 Next »

13%
Nearly 1 Million Misconfigured Kubernetes Instances Found Vulnerable
29.06.2022
Home »  News  » 
 
containing sensitive data. During their investigation, Cyble discovered the United States had the highest exposure count, followed by China and Germany. The top 3 exposed ports were 443, 10250, and 6443. And
13%
Rocky Linux 9 Now Available
25.07.2022
Home »  News  » 
 
: OpenSSL 3.0.1, featuring various improvements OpenSSH 8.7p1, which offers the SFTP protocol for more predictable filename handling Improved SELinux performance Automatic configuration
13%
Demand for Tech Talent Remains High
28.11.2022
Home »  News  » 
 
Despite industry layoffs, economic challenges, and reported hiring freezes, demand for tech talent remains high, according to a recent survey from Dice, “with more than 3.8 million tech jobs posted
13%
DOE Announces Graduate Research Grants
01.03.2024
Home »  HPC  »  News  » 
 
workshops to assist with the SCGSR application process. According to the announcement, “The first workshop (March 7, 2pm-3:30pm) will provide a general overview of the program and the application requirements
13%
Open Source Malware on the Rise, According to Sonatype Report
18.10.2024
Home »  News  » 
 
% of application dependencies remain un-upgraded for more than a year, even though 95% of the vulnerable versions have safer alternatives available. 3.6% of dependencies are still vulnerable because they were
13%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
-popular Travis CI [3] or GitLab CI [4]), which integrates easily with tools you might normally use manually. These tools might be used for database hacking, penetration testing, open network port probing
13%
Tails: The Amnesic Incognito Live System
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
with applications that encrypt your files, email, and chat messages. Tails version 1.1 is based on Debian GNU/Linux and boots into the Gnome desktop version 3.4 in Fallback mode
13%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Organizations today often divide their local networks using switches, which operate Layer 2 of the OSI model, rather than the (Layer 3) routers for which the TCP/IP network protocol system
13%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
summary of the status of the system. Let me explain with an example. Figure 1 is a screen shot of my desktop when I was running Python code test3.py (a long-running processor- and memory-intensive piece
13%
Ubuntu Server 22.04 LTS (Install)
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
, and Loki. Other features include: Compatibility with all major architectures OpenSSL 3.0 Linux 5.15 kernel SmartNIC support in Netplan

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice