Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (278)
  • Article (139)
  • News (41)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 Next »

19%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
In an age when laptops are more powerful and offer more features than high-performance servers of only a few years ago, whole groups of developers are discovering new opportunities in their data
19%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
VirtualBox on a laptop (Linux Mint Ubuntu 16.04 derivative) with UEFI, I had to install a new Machine Owner Key (MOK) after a reboot. To do this, I set a password for the VirtualBox package at installation
19%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
packages, entering python3 instead of python will output the following: $ python3 --version Python 3.5.2 On Debian derivatives (I'm using Mint/Ubuntu on my laptop), you can use the following commands
19%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
, then an old laptop is probably better suited than a VM, because it avoids the virtualization layer between Kali and the network. Three Applications Once Kali is running, the tools can be divided roughly
19%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services
19%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
for Windows Assessment Console (WAC). When installed on a laptop, WAC offers tests mainly optimized for evaluating the system's battery life (Figure 3). To work around this problem, you can select the Run
19%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
and with Windows 2000, modern Windows versions can handle this problem. Nevertheless, during the pandemic, some organizations used group policy to disable machine password changes for home office laptops
19%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
Computing Environments) support or another terminal device (laptop, PC) will ideally be in place on the user side. The open source SPICE software and SPICE protocol of the same name act as the communication
19%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. If the company's own service laptop breaks down, an employee is practically unable to work until they are issued replacement hardware that is allowed to talk to the VPN
19%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
solutions such as Rsync came into play. However, Rsync requires a functioning network connection between systems. A company laptop that has to be connected to the VPN to get an Internet connection does

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice