Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 70 Next »

12%
Program from one source to many apps with Flutter
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Pynkhlainborlang Khongwar on Unsplash
().replaceFirst('T', ' ').replaceRange(w.date!.toIso8601String().lastIndexOf('.')-1, w.date!.toIso8601String().lastIndexOf('0'), ''); 113 }); 114 } 115 116 @override 117 Widget build(BuildContext context) { 118 return ... Developing apps in the past for Android, iOS, the web browser, and the desktop meant having to write different versions of the code; however, that's no longer the case thanks to Google's Flutter
12%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
: The Mydigipass.com cloud application enriches web applications with two-factor authentication. OAuth API Mydigipass.com provides a standardized interface in the form of the OAuth 2.0 API [20 ... potential approaches for common use cases.
12%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
Query themselves. A W3Techs [2] statistic even suggests that jQuery is used on two-thirds of all websites worldwide. Dismantling On June 9, 2016, the developers released jQuery version 3.0 [3]; an update followed ... The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.
11%
Five free wiki platforms reviewed
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Mariia Zakatiura on Unsplash
meager. In most cases, you just need a web server and a database server. Some systems can even manage without a database. The learning curve for users is also low because the Markdown syntax for text can ... for different use cases on the local network.
11%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
Within a couple of hours, an experienced Internet attack specialist can bring your server infrastructure to its knees. In many cases, the barn door through which the attackers gain entry ... cases, SQL injection was the root cause of a server's compromise.
11%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
.gtld-servers.net. redhat.com. 172800 IN NS ns2.redhat.com. redhat.com. 172800 IN NS ns3.redhat.com. redhat.com. 172800 IN NS ns1.redhat.com. redhat.com. 172800 IN NS ns4 ... The new DNS over HTTPS standard from the Internet Engineering Task Force is meant to eliminate some of the known vulnerabilities of the Domain Name System.
11%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
on the desktop. This situation is not the case for servers, unless you use the same username for the RDP connection as for the console connection. RDP client access licenses (CALs) are not required for managing ... Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
11%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
with an Ethertype of 0x88e5 on the provider's network. Because MACsec works on Layer 2, it must be individually enabled for each interface. Encryption Method MACsec uses AES-GCM as the encryption algorithm ... MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
10%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
additional functions they needed, whereas painstaking development has always overtasked the midcaps. This situation has now finally changed with Hadoop 2.2.0. Infos Apache Hadoop: http ... Hadoop 2.x and its associated tools promise to deliver big data solutions not just to the IT-heavy big players, but to anyone with unstructured data and the need for multidimensional data analysis.
10%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
.owasp.org/index.php/Certificate_and_Public_Key_Pinning "EMET 4.0's Certificate Trust feature" by Elia Florio: https://blogs.technet.microsoft.com/srd/2013/05/08/emet-4-0s-certificate-trust-feature RFC 7469: Public Key Pinning extension for HTTP: https ... HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice