Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1075)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 146 Next »

25%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
. The GRUB2 bootloader, used in most cases today, is responsible for loading the Linux kernel (vmlinuz) and a ramdisk (initramfs) into memory at boot time. The kernel then mounts the ramdisk on the system
25%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
very limited, which prevents a complete resolution of the facts of the case. The context in which the evidence exists is another issue. External forensics investigators might not, at first glance
25%
New features in PHP 7.3
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © MIR, Fotolia.com
. Special characters (e.g., the German Eszett) can sometimes cause problems, especially when compared. In addition to case mapping, case folding can occur, in which individual letters are replaced with other
25%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
together to capture, transfer, and analyze a memory image file. In this case, the analysis turns up some hidden processes running on the infected system. Volatility and Mandiant Redline are very versatile
25%
Why databases are moving to the cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Wesley Tingey on Unsplash
cloud, multicloud, or hosted DBaaS. It's just a matter of where the data is stored and how it is accessed. In the case of on-premises databases, access is over the corporate network (and VPN, if necessary
25%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
of the traffic is routed via cloud infrastructure (in the form of virtual tunnel endpoints), this traffic does not even touch the physical networks in many cases. This means that administrators lose visibility
25%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
harvesting landscape by stealing the title from Maurice Sendak's children's story Where the Wild Things Are ; in this case, they're most likely user credentials, including, in order (according to me): Web
25%
Forensic analysis with Autopsy and Sleuth Kit
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Tomasz Pacyna, 123RF.com
classic dd images, but also those in the expert witness format (EWF), a proprietary format belonging to EnCase software [2] from the software vendor OpenText, or virtual machine VMDK and VHD images. If you
25%
ESXi ransomware attacks
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Afif Ramdhasuma on Unsplash
cases, you will hear about the benefits of virtualization, the added security that isolating individual machines can provide, and how easy it is to revert to previous versions at any time with snapshots
25%
Secure passwordless logins with FIDO2 and LDAP
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
to share a secret, including secrets that are used for two-factor authentication. Therefore, these secrets can no longer be lost on either side. In case of an attack, all the attacker gets is a user's public

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice