Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: expect ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (318)
  • Article (100)
  • News (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 43 Next »

29%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
this case has intended exceptions (e.g., shared memory allocated by the operating system) that are not considered to be security problems. Processes in kernel mode are not affected by this restriction. App
29%
Using Libvirt with Python to manage virtual machines
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © fourseasons, 123RF.com
online. This small example is deliberately kept simple. If you want to use the script for serious applications, you should at least add exception handling. If desired, you can, of course, tap the API
29%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
provides the options. To test for SQL injection only, run the command ./nikto.pl -url example.com -Tuning 9 You can also exclude individual tests. Assuming you want to check everything except SQL injection
29%
Controlled container communication
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
in Figure 1, the following four chains are created in the filter table: DOCKER, DOCKER-USER, DOCKER-ISOLATION-STAGE1, and DOCKER-ISOLATION-STAGE2. With the exception of the DOCKER-USER chain, you should
29%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
the container and on the host. With the exception of the user namespace, the host and the container really do use independent namespaces. For example, the systemd process is hiding behind PID 1 in the PID
29%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
result: {connect_result}") 085 # return structure with data 086 return result 087 except Exception as e: 088 print(f"Failed to connect to {self
29%
News for Admins
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
 
, and Windows, was affected by the bug. The only exception was Mac OS. In its report, Armis said, "BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure 'air
29%
Data Security vs. Data Protection
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Andrea Danti, 123RF.com
tools such as Subversion or Git can help. All changes to a file are traceable there, except for low-level changes to the repository. Data security can therefore be understood in the traditional sense
29%
IBM offers a sensational $34 billion for Red Hat
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
exception being the purchase of EMC by Dell. If proof were needed, it is now on the table: Open source is viable in terms of technology and as a business model and is valuable in every respect. – Jens
29%
News for Admins
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
-based Linux distributions are affected by the vulnerability except for SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29. These distributions compile their userspace code with GCC's -fstack

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 43 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice