Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (246)
  • Article (10)
  • News (7)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 27 Next »

19%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
, admins face limited bandwidth for network-based data transfer. Additionally, they need to worry about data security and protection requirements, the increasing need for automation, huge mountains
19%
Operating large language models in-house
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Conner Baker on Unsplash
data, which will always remain on your network, which improves data security, and which helps you comply with strict data protection requirements, especially in highly regulated industries. Moreover
19%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
SUSE) already provide inherent load balancing capabilities for most network services, such as web, cache, mail, FTP, media, and VoIP. These inherent capabilities are based on Layer 4 switching, allowing Linux
19%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
The Network Mapper, or Nmap [1], is one of the most popular network scanners available. System administrators and security specialists use Nmap for network scanning, discovery, and inventories. Nmap
19%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
with the use of the built-in validation logic. The choices that Desktop Authority offers administrators creating profiles are versatile and leave little to be desired, whether you need to assign network
19%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
This issue features a free DVD with NodeZero Linux, a "pentest" distro containing more than 300 tools for network penetration testing. NodeZero's Live boot option lets you boot from the DVD without
19%
AWS European Sovereign Cloud Now Generally Available
26.01.2026
Home »  News  » 
 
infrastructure features multiple Availability Zones with redundant power and networking, designed to operate continuously even if connectivity with the rest of the world is interrupted,” Stormacq says. AWS also
19%
Wireless Infrastructure Struggles to Meet AI Demands, Per Cisco Report
10.04.2026
Home »  News  » 
 
The proliferation of AI is exposing vulnerabilities in legacy wireless networks, according to Cisco’s State of Wireless 2026 report. “For years, wireless was the ‘invisible utility
19%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
specifically network services) to a minimum. By having, say, only three ports open on your server, such as HTTP, SMTP, and SSH, you're significantly limiting the number of attack vectors on your system. Aside
19%
From Out of the Blue
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
sorts of coding and design practices tend to introduce vulnerabilities. Areas such as the networking and filesystem subsystems and various system call interfaces are always going to be worthwhile targets

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice