Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 101 Next »

15%
Public key infrastructure in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Tsung Lin Wu, 123RF.com
a secure remote maintenance solution. Server certificates for the entire e-commerce infrastructure, including web servers, load balancers, and server farms, are also conceivable as an extension of PKI
15%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
Code on Systems A critical vulnerability in systemd, the modern init system used in Linux systems, can potentially allow a remote attacker to execute malicious code on a system through a DNS response
15%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
vulnerabilities of the highest severity and the ability to execute arbitrary code in the context of the server software as a remote attacker. Greater Potential for Damage In contrast to attacking individual VMs
15%
Passkeys eliminate the need for password-based authentication
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © Olivia, Fotolia.com
itself generates these keys and transmits the first key, which is the public key, to the remote IT system. As with any private-public key method, this public key is not a secret. It doesn't matter
15%
News for Admins
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
 
InformationWeek, the majority of IT and security teams have effectively handled the operational challenges of dealing with primarily remote workforces. However, the majority of respondents also said their teams
15%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
." To address those components, Red Hat identified three basic edge architectures: Far edge – single server locations with limited connectivity Closer edge – factory, branch, or remote store with reliable
15%
News for Admins
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
 
into the operating system. " Three specific security-minded features are: Cryptographically-authenticated boot. Full disk encryption. Manual and remote recovery modes. Ubuntu Core 20 also addresses
15%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
drives and tapes), one of which is stored in a different location. Different variations of this concept exist: The 3-1-2 concept states that the two backups can be in different remote locations
15%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
, and remote computers. However, if you want to secure running containers, it is not enough to just look at the host's INPUT chain and filter incoming traffic. As a firewall administrator, you might know
15%
News for admins
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
, affects more systems than previously thought. In a recent post, the company said the hidden backdoor with a hard-coded password, which the company described as a "remote management feature," had been

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice