Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 154 Next »

12%
Sysdig Report Highlights LLMjacking and Other Security Threats
30.10.2024
Home »  News  » 
 
attacks are fairly easy to identify based on CPU resource consumption, LLM usage cannot be detected this way because “there is only one behavior – a call to the LLM.” Additionally, “LLM resource consumption
12%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
to the original C code. IL stands for "intermediate language"; Binary Ninja offers different language levels up to C code. In this example, the main function will look very similar to the C code. The call
12%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
, prevents access to specific system calls by a process. Although a process uses system calls to access the kernel, most of the 600 available calls are only rarely used. Without them, the potential attack
12%
Simple Event Correlator
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © cepixx, 123RF.com
need to call the program like this: sec -conf=ssh.conf -input=- If you now enter arbitrary strings in a terminal window, nothing happens; but, if you enter Failed password for root, SEC acknowledges
12%
Fedora 32 Server (Install Only)
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
subsystem is the default firewall backend for firewalld users are defined in sysusers.d format all scriptlet calls for core packages have been removed to speed up the install process of container images
12%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
in the Apache logs. As of now, the recommended method for uncovering evidence of the attack is a search of shared memory. ESET's We Live Security blog describes the attack and provides a tool called dump
12%
Web Cryptography API
26.11.2013
Home »  Articles  » 
. Figure 1: The console in the Chrome browser uses PolyCrypt to evaluate the call to encrypt("abc"). WebCrypto by Netflix is another implementation of a polyfill. In contrast to PolyCrypt, Web
12%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
for security reasons. In other words, you want to download the CSV file and store it in a safe place where you can find it again even six months later. The preceding call connects to the default region
12%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
, Julia parses the command syntax directly, interpolating variables and delimiting on words as the shell would. The task runs it as an immediate child process (using fork and exec calls). Check Running
12%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
[5]. If a Python3 installation with pip is on the system, Kiwi NG can also be installed with the pip install Kiwi command. After the setup, you call the binary kiwi-ng. The first version of Kiwi

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice