Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1165)
  • Article (300)
  • News (171)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 164 Next »

27%
A New Ransomware Targeting Linux-based NAS Devices
16.07.2019
Home »  News  » 
 
known vulnerabilities. The ransomware implementations are named "QNAPCrypt" by Intezer and "eCh0raix" by Anomali. Written in the Go programming language, the ransomeware encrypts files with targeted
27%
Purdue Scientists Build Quantum Gate
17.07.2019
Home »  HPC  »  News  » 
 
a quantum computer that is similar to the gates used in today’s computers, processes information in qudits. A qudit differs from a qubit in that it supports more than just the 0 and 1 states. The researchers
27%
A New Backdoor Found in Microsoft SQL Server
22.10.2019
Home »  News  » 
 
Security researchers at ESET have found a backdoor in Microsoft SQL server that allows an attacker to control a system remotely. “Dubbed Skip-2.0, the backdoor malware is a post-exploitation tool
27%
Put your Stack on Java with Sincerity
06.01.2014
Home »  News  » 
 
that are written in Javascript, Python, Ruby, PHP, Lua, Groovy, Clojure, and Scala. Sincerity is licensed under the Free LGPL 3.0 license.
27%
Malicious XZ Attack Planned for Years
08.04.2024
Home »  News  » 
 
The malicious code recently discovered in versions 5.6.0 and 5.6.1 of XZ Utils “appears to be the product of a carefully crafted supply chain attack that took several years to set up,” reports
27%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
Google Announces Kubernetes 1.0 Google has announced the Kubernetes container orchestration system has reached the v1.0 milestone. Kubernetes runs within a "Google-style infrastructure stack
27%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
long count=0; //Count holds all the number of how many good coordinates 14 double z; //Used to check if x^2+y^2<=1 15 double pi
27%
OpenSSL 3.5 Released
24.04.2025
Home »  News  » 
 
-party QUIC stacks including 0-RTT support. Support for multiple TLS keyshares and improved TLS key establishment group configurability. OpenSSL 3.5 is a long-term stable (LTS) release
27%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
. This type of attack is known as a man-in-the-middle attack. In this article, I mention a number of tools used in ARP cache poisoning attacks, including ettercap, arpspoof, Nemesis, p0f, dsniff, and Scapy
27%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
that Ansible calls are determined by the Hosts file (usually in /etc/ansible/hosts) and the variables set in it for each host. Listing 1 shows the original file. Listing 1 ELK Stack Hosts File 10.0

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 164 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice