Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 160 Next »

39%
US Government Gives AMD $3.1 Million Grant
20.11.2013
Home »  HPC  »  News  » 
 
realize the enormous potential of extreme-scale computing."   According to the press release, the grant is part of DOE's strategic plan to "...address the nation’s most pressing scientific challenges
39%
Google Launches Quantum Computing Playground
03.06.2014
Home »  HPC  »  News  » 
 
Google has added a new tool to its gallery of online tools known as the Chrome Experiments. The new Quantum Computing Playground offers access to a computing environment that simulates the behavior ... Google Launches Quantum Computing Playground
39%
Write for Us
11.11.2011
Home »  HPC  » 
 
is always easier than writing about something that does not interest you. Tutorials, reviews, overviews, case studies, and news are always needed. We can handle any type of submission but prefer email
39%
Intruders Use Draft Email Messages for Attacks
11.11.2014
Home »  News  » 
 
is accessed from the client, the script executes. Because the attack is triggered through an ordinary service that does not leave a trace of clandestine activity, it is very difficult to discover. This attack
39%
New SSL Attack Exploits an Old Problem
31.03.2015
Home »  News  » 
 
attack on SSL that does not require man-in-the-middle techniques to steal sensitive data ….” The attack is actually based on a 13-year-old vulnerability that is “based on huge classes of RC4 weak keys
39%
Linux Kernel Turns Over
15.04.2015
Home »  News  » 
 
.” According to the announcement, 4.0 does not come with a trove of experimental new features but is a very stable release. One new feature that has drawn some excitement from the Linux community is the new
39%
Compromised Linux Servers Fall into Massive Botnet
30.09.2015
Home »  News  » 
 
an increasing tendency for attackers to focus on Linux. This trend probably does not reflect reduced security of Linux systems but could be a response to the fact that Windows security has improved in recent
39%
Time Protocol Threat Could Allow Login with Expired Passwords
28.10.2015
Home »  News  » 
 
with the sender, bypassing authentication typically required to establish a peer association.” Although a time protocol does not provide direct access to financial or medical information, an attacker can do
39%
One Third of All IT Infrastructure Expenditure is Going to Cloud
20.01.2016
Home »  News  » 
 
in the third quarter of 2015. The total cloud expenditure was up 23 percent since this time a year ago. The report does not track direct cloud space allocations but measures server, disk storage, and Ethernet
39%
Coding Flaw in Git Could Lead to Buffer Overflow
16.03.2016
Home »  News  » 
 
year as part of a bug bounty effort. As of now, it does not appear that the malware industry has used this problem for a real-world attack, but once the information is public, it is only a matter of time

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice