Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 140 Next »

36%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
on Linux systems. Docker uses the Linux kernel features of both cgroups [5] and namespaces [6], as well as a "union" filesystem [7] such as AuFS [8]. This allows the containers to be isolated from one
36%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
SETTINGS% \ Temporary Internet Files \ Content.Word \ ~WRX- 4014.tmp. The dropped file is run via the Windows "CreateProcessA" function or the Windows Management Interface (WMI) COM interface. Executing via
36%
Azure Arc agent on local machines
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rungaroon TAWEEAPIRADEEMUNKONG, 123RF.com
servers (e.g., over SSH) by opening the portal.azure.com URL and clicking on the All resources link. After starting the desired server, you will see various tiles in the lower area that let you perform
36%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
guide of YouTube videos [5] can help you get things working just as you like; you can even find guides for running the application on Google Kubernetes Engine (GKE), which merits a look, too
36%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
, enter: wget -O vscode_cli_alpine_x64_cli.tar.gz 'https://code.visualstudio.com/sha/download?build=insider&os=cli-alpine-x64' Note that if you want the stable edition of VS Code, then change the build
36%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
and system administrator more control over the security environment. Additional changes include modifications to signed applet policies and default plugin security. https://blogs.oracle.com
36%
ID Views smooth migration to a new identity management system
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Nigel Silcock, Fotolia.com
for foobar" --uid 5555 testview foobar # ipa idview-apply --hosts gateway.example.com testview If user foobar now logs in to any system, the user gets the ID that was defined when the user account
36%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
, it is clear that the legacy 9-to-5 working model in the office is a thing of the past for many. Even when new people join the company, their first day at work often no longer takes place on the company premises
36%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
Dradis: https://dradis.com Dradis repository: https://github.com/dradis/dradis-ce Sample results for Burp Suite: https://portswigger.net/burp/samplereport/burpscannersamplereport
36%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
-resistant component is Kyber [5], which was standardized as ML-KEM. Kyber, which is an outcome of NIST's Post-Quantum Cryptography competition, is a lattice-based key encapsulation mechanism (KEM). Its security relies

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice