Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (428)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 229 Next »

17%
Multicloud management with Ansible
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Pawel Nolbert on Unsplash
Many cloud providers vie for the user's favor. Besides the top dogs, Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP), smaller regional or specialized providers are increasingly ... Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
17%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
. DiffServ service classes provide the necessary traffic characteristics to the various applications on an end-to-end basis. RFC 4594 defines 12 service classes: two for network operation ... DiffServ service classes provide quality of service on the network for demanding modern applications such as Video over IP.
17%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
securely between your server and any remote client that connects to it. Figure 2: A tunneled connection provides no public access, only a tunneled connection ... The powerful Cloudflare Tunnel provides secure and seamless access to servers and applications, making it a convenient alternative to VPN for any modern IT infrastructure.
17%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
that operates various research facilities on behalf of the U.S. government, provides comprehensive information on IT security. MITRE developed the CVE system, for identifying and assigning unique identifiers ... The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
17%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
across the network. To help this evolving market, Intel is introducing QuickAssist technology. Intel QuickAssist Technology [1] provides security and compression acceleration capabilities to improve ... Quickassist technology offloads computationally intensive compression and encryption tasks to provide a performance boost for Intel processors.
17%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
is to provide a modern and secure SSO experience for any application on the basis of either the OIDC or SAML framework (see the "OIDC vs. SAML" box). OIDC vs. SAML OpenID Connect (OIDC) is the only ... Keycloak is a robust and mature project that provides a modern single sign-on authorization experience and centralized authentication of your apps.
17%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
. Formatting strings is similar to C programming, such as string.format("%.7f", math.pi) for numbers. The string module also provides a set of functions that allow you to search for characters in strings ... The Lua scripting language is built in to a variety of programs. In this article, we provide an insight into the Lua cosmos.
17%
Spam protection using SpamAssassin
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
protection needs to be updated continually if it is to provide protection. Ideally, the filter should be located in the enterprise at the central node through which incoming email traffic runs and where ... The intelligent, modular SpamAssassin email filter provides a variety of advanced tests for detecting unwanted junk email.
17%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
not provide for permanent storage of the analysis data with n2disk. Ntopng focuses on two important Linux distribution branches: Debian/Ubuntu and Red Hat/CentOS. The packages required for ntopng are easily ... The open source ntopng tool provides deep insights into network traffic and supports troubleshooting when network problems occur.
17%
Create your own turnkey solutions
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fandorina Liza, 123RF.com
that does not demand extensive knowledge of the internal design. For some appliances, you will have to provide a complete stack – all the way from the kernel to the userland applications. Other times, you ... Software appliances provide a convenient means for packaging, transporting, and deploying software without the need for complex, repetitive configuration steps.

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice