Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 138 Next »

28%
News for Admins
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
 
source software is seeing a dramatic rise in deployment. From the survey, 95 percent of respondents claimed that open source is strategically important, while 36 percent said it was very important
28%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
processes. As many computer science students first learn accidentally in their systems programming class, fork and its variants can also be used to stress a system by generating a very large number
28%
A REST interface for FreeIPA
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © P.Gudella, 123RF.com
, the individual methods and available parameters are very well documented.
28%
News for Admins
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
them and that they may remain exposed for a very long time. Serious iOS Vulnerability Discovered Apple has released a critical security patch for i
28%
News for Admins
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kran Kanthawong, 123RF.com
significant development efforts to build attack tools that utilize these vulnerabilities." There is a caveat, though. Harry Sintonen, F-Secure's senior security consultant, once said it's very easy to gain
28%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
Over a year ago, the WannaCry malware infected almost a quarter of a million Windows computers around the world, encrypting data and demanding a ransom within a very short time. Due to an already
28%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
applications had their permanent place, this approach could work very well. The DevOps Catalyst With the advent of DevOps and its continuous release pipeline, the individual automation silos are often
28%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
] that serves as the basis for setting up a KVM-based virtual machine that can be made available within a very short span of time using the virt-manager or virt-install tools. On top of that, I take a regular
28%
Systemd network management and container handling
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Kritiya Sumpun, 123RF.com
useful information for these tools. Conclusions The systemd developers have again added some very useful features to the current release, once again expanding the systemd universe. Two features presented
28%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
. Anyone can take your photo then find everything about you via social networks. That's exactly what the Russian site FindFace is doing. FindFace is bringing a very powerful facial recognition technology

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice