Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 171 Next »

13%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
resources a container can use. At the same time, the container itself only sees certain processes and network functions. Although an attacker will find it difficult to interact with the host's kernel from
13%
News for Admins
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
Could Allow Login with Expired Passwords Cisco's Talos threat intelligence service has uncovered a flaw in the Network Time Protocol (NTP) authentication process that lets an attacker force the NTP
13%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
/Locky.A Encrypt and Blackmail The name "Locky" already suggests its function. The ransomware encrypts files on the affected computer, on network drives, and even in the cloud, thanks to synchronization. These data
13%
Targeted attacks on companies
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Ildar Galeev, 123RF.com
network and to work their way up to the company's genuinely worthwhile targets through the infected mobile device. The name of this method is derived from the animal world: Where animals in drier regions
13%
News for Admins
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
© Elnur Amiskishiyev, 123RF.com
, it moves in to infect other computers on the network. Trojan.Kwampirs creates a service to ensure persistence, so that the main payload is loaded into memory during system reboot. "When executed, Kwampirs
13%
Multifactor authentication with Google Authenticator
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © iofoto, Fotolia.com
configuration: auth required pam_unix.so or the corresponding include command: @include common-auth Anyone already working on a supposedly secure network might get tired of constantly looking at their mobile
13%
News for Admins
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
© Kirill Makarovy, 123RF.com
Russian FindFace App is a Privacy Nightmare The machine-learning capability that social networks are gaining is becoming a privacy nightmare
13%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
on company networks can be attacked in many ways. You need to make a distinction between user access and privileged access. © Microsoft [2] In contrast to a local AD, restoring access to the Entra ID
13%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
in awareness training courses is the man-in-the-middle attack, in which attackers intercept data traffic on unsecured networks, such as public WiFi networks in hotels or cafés. Because almost all web
13%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
and extend the system's functionality." For example, the company states that the system provides easier integration with existing networks, visual server configuration and management, and other benefits

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice