Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 93 Next »

26%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
environment, the required infrastructure is set up quickly. After installing the Windows Management Framework 4 [1], included in Server 2012 R2 and Windows 8.1, you already have the tools in place. Power
26%
Quest Updates Unix sudo Tool
15.12.2011
Home »  News  » 
 
to be run as root or other users, with command logging and fine-grained access controls. Sudo 1.8, which was released in March 2011, includes a new pluggable architecture that allows third-party plug
26%
More Than 80% of Android Devices at Risk of Attack
17.08.2016
Home »  News  » 
 
. The root cause of this flaw is a serious vulnerability in the TCP specification that “allows a blind off-path attacker to infer if any two arbitrary hosts on the Internet are communicating using a TCP
26%
New Systemd Vulnerability Affects Most Mainstream Linux Distributions
15.01.2019
Home »  News  » 
 
-2018-16866) resides in "systemd-journald" service and could allow an attacker to gain root access on the targeted systems. "We developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains
26%
Hive Ransomware Hitting Linux and FreeBSD Systems
02.11.2021
Home »  News  » 
 
of Hive, the Linux/FreeBSD iteration only includes one command-line parameter (-no-wipe). When executed without root permission, the Linux variation of Hive fails to trigger the encryption, because it isn
26%
Another Serious Flaw Found in All Major Linux Distributions
26.01.2022
Home »  News  » 
 
discovered the pkexec command could be used by local attackers to increase privileges to root in Ubuntu, Debian, Fedora, and CentOS (and warn that it's most likely exploitable in other distributions as well
26%
Dangerous Vulnerability Found in Mozilla VPN Client
09.08.2023
Home »  News  » 
 
. The flaw was discovered by SUSE developers, who found that the program contains a “privileged D-Bus service running as root and a Polkit policy.” They disclosed the issue to Mozilla in May but failed to get
26%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
and monitoring. You can thus centrally manage your virtual switches. Once the service is installed and set up, you can manage your networks with System Center Virtual Machine Manager 2012 R2 or 2016, as well
26%
Firefox Fixes Error that Crashed HTTPS Pages
02.07.2019
Home »  News  » 
 
can enable the ‘enterprise roots’ preference that allows Firefox to import any root CAs that have been added to the OS by the user, an administrator, or a program that has been installed on the computer
26%
Integrating FreeNAS with Windows Active Directory
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Parisod@Snowmelody, Fotolia.com
on integrating your FreeNAS box with Windows Active Directory. In this example, I am building on Windows 2012 R2, but you could build this many other ways. For example, if you have an open source environment, you

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice