Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 99 Next »

34%
Lenovo Buys Motorola Phone Division
03.02.2014
Home »  News  » 
 
Chinese laptop king makes a play for the mobile space.
33%
LibreOffice Vulnerable to Remote Code Execution Flaw
13.02.2019
Home »  News  » 
 
Security researcher Alex Inführ has discovered a vulnerability in OpenOffice and LibreOffice that allows remote code execution. In a blog post, Inführ wrote that he found a way to achieve remote ... LibreOffice Vulnerable to Remote Code Execution Flaw
33%
Hackers Threaten to Wipe More Than 300 Million Apple Devices Remotely
29.03.2017
Home »  News  » 
 
Hackers Threaten to Wipe More Than 300 Million Apple Devices Remotely
33%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
. When the switch (authenticator) receives the request, it sends the credential to an authentication server, which may be a Remote Authentication Dial-In User Service (RADIUS) server or an agent ... What happens when an intruder with a laptop parks at an empty cubicle and attaches to your local network? If you don't want to find out, it might be time to think about implementing some switch port
33%
Zero Day UEFI Exploit Affecting Lenovo, HP, and Gigabyte Laptops
06.07.2016
Home »  News  » 
 
A security researcher named Dmytro Oleksiuk has discovered a zero-day exploit for the low-level firmware found in some Lenovo laptops. Oleksiuk wrote on GitHub, “Vulnerability is present in all ... Zero Day UEFI Exploit Affecting Lenovo, HP, and Gigabyte Laptops
32%
SSH on Windows
17.09.2013
Home »  Articles  » 
For Linux admins, SSH is one the most important tools of remote administration. SSH also works in Windows, with tools such as PuTTY or WinSSH, MobaXterm, WinSCP, or Swish. ... operate a secure FTP server with standard tools and that there are countless secure and powerful FTP clients. The charm of SSH consists above all in being able to use remote logins, file transfers, port ... For Linux admins, SSH is one the most important tools of remote administration. SSH also works in Windows, with tools such as PuTTY or WinSSH, MobaXterm, WinSCP, or Swish.
32%
CISA Issues Emergency Directive for Vulnerabilities Affecting Cisco Devices
03.10.2025
Home »  News  » 
 
threat actor targeting Cisco Adaptive Security Appliances (ASA). The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well ... Recent vulnerabilities allow for remote code execution and privilege escalation.
32%
New Linux Malware Infects All Running Processes
18.07.2022
Home »  News  » 
 
functions, provides the threat actors with remote access capabilities over SSH, harvests credentials, and logs TTY commands,” reports Nicole Fishbein. OrBit steals information from different commands ... OrBit provides attackers with remote access over SSH.
32%
New Zealand Supercomputer Hacked
04.06.2014
Home »  HPC  »  News  » 
 
Attackers may have wanted access to surrounding network and remote connections.
32%
Critical Flaw in phpMyAdmin
02.01.2018
Home »  News  » 
 
The vulnerability allows any remote attacker to damage MySQL databases.

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice