Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1135)
  • News (398)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 184 Next »

20%
Interprocess communication essentials in Perl
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Carsten Reisinger, 123RF.com
a pipe with the pipe command. Although you can use the open function in lieu of the pipe function, I'll stick to piping at first. It should be noted that the use of fork is entirely operating system
20%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
." Charly's advice: "Use Metasploitable, perhaps the most broken Linux ever." My experience with careless pen testing came when an overzealous OpenVPN course participant at Linuxhotel used a pen-testing tool
20%
The path forward
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
this opportunity, as well as the openSUSE Conference in Nuremberg, Germany, to speak extensively with Dr. Thomas Di Giacomo, President of Engineering, Product, and Innovation for SUSE (Dr. T). Linux Magazine
20%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
In recent years, the software supply chains at SolarWinds and Kaseya, among others, have been targeted, along with identified vulnerabilities in widely used open source libraries, including
20%
Living with multiple and many cores
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
" to make use of the extra cores. Creating the new "parallel" code could be done in several ways. Most developers used Posix threads, OpenMP, parallel libraries, and even MPI. Now, application speed-up comes
20%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
AlienVault Virtual Appliance AlienVault released the first AlienVault Unified Security Management (USM) virtual appliance. AlienVault USM is a collection of open source tools for asset discovery
20%
One Hacker Could Have Taken Control of Macs Used by IT Professionals
14.08.2018
Home »  News  » 
 
want support for more languages and packages, you need to install third party package managers. Homebrew is one of the most popular package managers for macOS. It’s fully open source and puts a huge
20%
Sincerity: Put your Favorite Stack on Java
06.01.2014
Home »  News  » 
 
The Sincerity project, an open source project supported by Three Crickets LLC, announces the beta version of Sincerity, Sincerity is a tool for deploying, installing, and bootstrapping software
20%
IBM Rolls Out $1.2 Billion Investment in the Cloud
28.01.2014
Home »  HPC  »  News  » 
 
on five continents. New data centers will open in China, Washington DC, Hong Kong, Japan, India, Canada, Mexico, and Texas. With this latest move, IBM hopes to build upon the investment it made last year
20%
Fedora Announces Innovative Crytography Policy System
18.03.2014
Home »  News  » 
 
and processes.  This change will require updates to GnuTLS, OpenSSL, and NSS libraries.  Fedora Linux is the community-driven test bed for technologies that will someday be part of Red Hat's flagship systems

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 184 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice