Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 132 Next »

15%
News for Admins
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
 
of malware called web-browserify. This new piece of malicious software imitates the official Browserify component, which uses a node-style require() to organize browser code and load modules installed by npm
15%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
ballots, and some of these machines remain unacceptably vulnerable to attack. In order to protect voting machines, Microsoft recently released an open source software development kit called Election
15%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
. In this article, I explore a relatively new addition to Lambda functions in AWS called "layers" and, with the use of a Bash layer provided on the GitHub page by author Graham Krizek [3], I run a Bash script
15%
News for Admins
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
 
AI Bluetooth Attack In September, Armis Labs disclosed a new attack vector called BlueBorne that affects Bluetooth devices. Every desktop, IoT, and mobile platform, including Android, iOS, Linux
15%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
– in particular, the protection of personal data against misuse. Personal data means not just personal information, but data that can lead to the direct or indirect identification of an individual (also called
15%
News for Admins
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
, including Chrome and Edge, since syscall filtering mitigations do not apply to ntoskrnl.exe system calls," said Kaspersky. Kaspersky Lab believes that this exploit is used by bad actors, including Fruity
15%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
system. The bug called "Absolute Path Traversal" bug (CVE-2018-20250) is found in a UNACEV2.DLL, a third-party library. It allows attackers to extract a compressed executable file from the ACE archive
15%
Application virtualization with Docker
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Oleksiy Mark, 123RF.com
as long as the application is running. If you log out of the shell within the container, the container also stops. A renewed call to docker ps confirms this. This command supports a number of useful
15%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
. Setting this jumper will adjust sector addressing "in hardware" off by one, mapping address n into physical sector n +1. You want to be extremely careful not to enable this unless it is actually called
15%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
can now create a new Fedora image with the call: ./run builder/virt-builder fedora-19 --output fedora19.img --hostname fedora19 This command tells the tool to generate a random root password

« Previous 1 ... 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice