Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 99 Next »

15%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
and bypass Secure Boot protections. Of course, in order to take advantage of this flaw, an attacker would have to have access to the physical system or remote access to the grub.cfg configuration file
15%
News for Admins
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
 
, such as remote branch offices, retail POS, cell towers, and autonomous automobiles. For more information, read the official announcement from Canonical (https://ubuntu.com/blog/introducing-ha-microk8s-the-ultra-reliable-minimal-kubernetes).
15%
Public key infrastructure in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Tsung Lin Wu, 123RF.com
a secure remote maintenance solution. Server certificates for the entire e-commerce infrastructure, including web servers, load balancers, and server farms, are also conceivable as an extension of PKI
15%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
Code on Systems A critical vulnerability in systemd, the modern init system used in Linux systems, can potentially allow a remote attacker to execute malicious code on a system through a DNS response
15%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
vulnerabilities of the highest severity and the ability to execute arbitrary code in the context of the server software as a remote attacker. Greater Potential for Damage In contrast to attacking individual VMs
15%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
itself generates these keys and transmits the first key, which is the public key, to the remote IT system. As with any private-public key method, this public key is not a secret. It doesn't matter
15%
News for Admins
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
 
InformationWeek, the majority of IT and security teams have effectively handled the operational challenges of dealing with primarily remote workforces. However, the majority of respondents also said their teams
15%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
." To address those components, Red Hat identified three basic edge architectures: Far edge – single server locations with limited connectivity Closer edge – factory, branch, or remote store with reliable
15%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
into the operating system. " Three specific security-minded features are: Cryptographically-authenticated boot. Full disk encryption. Manual and remote recovery modes. Ubuntu Core 20 also addresses
15%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
drives and tapes), one of which is stored in a different location. Different variations of this concept exist: The 3-1-2 concept states that the two backups can be in different remote locations

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice