• News
  • Features
  • Blogs
  • White Papers
  • Archives
  • Special Editions
  • DigiSub
  • Shop
  • Administration
  • Desktop
  • Development
  • Hardware
  • Security
  • Server
  • Programming
  • Operating Systems
  • Software
  • Networking
Search
Login
The latest Linux and Open Source News
Linux Magazine on Facebook

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • LMI Print Article (966)
  • Blog post (66)
  • LMI News (39)
  • LMI Online Article (35)
Keywords
  • programming (52)
  • administration (45)
  • linux (44)
  • community (42)
  • kernel (38)
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 111 Next »

7%
Virtualizing Rootkits
29.03.2009
Home »  Issues  »  2008  »  90  » 
 
identical hardware and an identical installation. The effect is caused by the virtual machine consuming CPU cycles itself. This kind of automated timekeeping might be fine to detect a legitimate virtual ... is caused by the virtual machine consuming CPU cycles itself. This kind of automated timekeeping might be fine to detect a legitimate virtual machine; however, it does not rule out the existence of a rootkit
7%
Yoggie Gatekeeper Pico
29.07.2008
Home »  Issues  »  2008  »  94  » 
 
to 192.168.118.0/24. The stick booted in the normal way and worked fine for the most part, but I was unable to access the administration GUI. The web filter in the gatekeeper appliance is based on Surf
7%
Anonymous Browsing
01.08.2013
Home »  Issues  »  2013  »  154  » 
 
Script. However, it autonomously blocks pop-ups. In Preferences , users can customize this behavior and set up exceptions. Additionally, the Tools | Page Info dialog supports fine-tuning (Figure 4). Here, users
7%
Kernel News
22.11.2013
Home »  Issues  »  2014  »  158  » 
 
and with the patch should actually coexist fine in the same kernel." He suggested that by selectively disabling each occurrence of asm goto, it might be possible to narrow the problem down to a single object file
7%
Meet Greg Kroah-Hartman
27.10.2016
Home »  Issues  »  2016  »  193  » 
 
for this conference, and I had 800 emails about just one subsystem. I went through them and found out that 200 of them applied, so I rejected the rest. Well, that's a bad percentage. That's fine. The point
7%
Tutorials – Wine
17.11.2016
Home »  Issues  »  2017  »  194  » 
 
is especially useful for fine-tuning settings and fixing compatibility issues. You can run it in place by simply entering: Figure 4 - You do not have permission to view this object. wine regedit
7%
Kernel News
03.01.2017
Home »  Issues  »  2017  »  195  » 
 
not to encrypt the running kernel. However, Tom replied that, absent being explicitly turned on, the encryption simply would not occur. He was fine with documenting a mem_encrypt=off option, though, if that would
7%
Tutorials – Intrusion Protection
03.01.2017
Home »  Issues  »  2017  »  195  » 
 
who compromised your servers could simply fake the OSSEC agent to make the master think that everything was fine. OSSEC ensures security by generating keys on the master server that are then installed
7%
Mycroft
27.04.2018
Home »  Issues  »  2018  »  211  » 
 
a deranged Sherlock Holmes. Sometimes it will hear you and work fine for the first few commands and then suddenly give up on you. It's very frustrating, but it's likely that as usage of the assistant increases
7%
Kernel News
30.08.2018
Home »  Issues  »  2018  »  215  » 
 
that if part of his code turned out to be reusable for a yet-deeper subsystem in the future, he'd be fine with that. But for the moment, he said, his code met the needs of the situation. Johan also added

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 111 Next »

  • About Us
  • Write for Us
  • Contact
  • Legal Notice
  • Privacy Policy
  • Manage Subscription
  • Glossary
    • Raspberry Pi
© 2025 Linux New Media USA, LLC