Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (647)
  • Article (150)
  • News (126)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 93 Next »

30%
All Chrome Users Should Immediately Update their Browser
17.05.2021
Home »  News  » 
 
be necessary is a restart of the browser (once you've been alerted). All other Linux users will have to either download the latest version of Chrome or run the update through their distribution package manager
30%
openSUSE Tumbleweed is About to Migrate to GCC 12
11.04.2022
Home »  News  » 
 
versions of libraries based on the CPU of a given system. This would make it possible for Linux to automatically load libraries that are better optimized for modern processors. Download your copy of open
30%
US DOE Announces New Funding for Studying Randomized Algorithms
20.04.2022
Home »  HPC  »  News  » 
 
-profit entities, DOE-NNSA labs, and federal agencies. For more information, download the DOE announcement.
30%
European Commission Updates Its Code of Practice on Disinformation
21.06.2022
Home »  News  » 
 
the press release at the European Commission website or download the full text of the code.   
30%
SUSE Report Reveals Cloud Security Concerns
28.06.2023
Home »  News  » 
 
than those in Europe (25%) to believe that security policy management, federation, and automation are among their biggest cloud security concerns.” Download the complete report to learn more.        
30%
Open Source Malware on the Rise, According to Sonatype Report
18.10.2024
Home »  News  » 
 
. Organizations continue to struggle with persistent vulnerabilities, such as Log4j, with 13% of downloads remaining vulnerable three years after the issue was first exposed, the report says. Specifically: 80
30%
Countering embedded malware attacks
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Daniela Mangiuca, 123RF.com
, thus making it even more difficult for users to notice a difference. The document contains a macro that enables malicious code downloads and thus acts as a downloader. In this case, the malicious code
30%
Getting data from AWS S3 via Python scripts
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © erikdegraaf, 123RF.com
Data produced on EC2 instances or AWS lambda servers often end up in Amazon S3 storage. If the data is in many small files, of which the customer only needs a selection, downloading from the browser
30%
Halting the ransomware blackmail wave
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sandra zuerlein, fotolia.com
Since February, there have been continuous waves of Locky infection. Windows users are attacked by drive-by downloads or email attachments. After infection, the malicious program encrypts individual
30%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
for the operating system, SharePoint Foundation 2010 for the company web, and Exchange Server 2010 as a mail server. Start by downloading the following packages: Windows Server 2008 R2 Service Pack 1 [1

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice