Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (219)
  • Article (75)
  • News (8)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 31 Next »

66%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where ... 48
36%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
followed. Because VMware has finalized some important PowerCLI 6 features in R3, we only look at the R3 version in this article. If you are still using PowerCLI R1 or R2, you might want to upgrade to R3 ... PowerCLI in the current version 6 R3 supports access to nearly all VMware data center and cloud products with around 500 cmdlets, including numerous additional features, APIs, and interfaces ... PowerCLI 6.0 Release 3 ... New Features in PowerCLI 6.0 R3
34%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... of machines. Tools such as FAI created for physical machines are of use when deploying virtual machines, as well, as are distro-specific tools (e.g., autoinstall for OpenBSD [2], preseed for Debian [3
29%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
of their internal 2.5-inch SATA devices, coming in at a mere 2.3x3x0.5 inches (5.8x7.6x1.3 cm) – smaller than a Post-it note (Figure 1). Available in sizes ranging from 256GB to 2TB, the specimen in our lab is the MU ... We kick the tires of a Samsung 500GB SSD that promises a transfer rate of 540MBps. ... Testing the Samsung MU-PA500B 500GB SSD
26%
Monster Chinese HPC System Clocks 30+ PetaFLOPS
04.06.2013
Home »  HPC  »  News  » 
 
FLOPS. This gigantic HPC system, which is called the Tianhe-2 (TH-2) or the Milky Way-2 supercomputer, comes with 32,000 Intel Ivy Bridge Xeon sockets and 48,000 Xeon Phi coprocessors for a total of 3,120,000 cores ... Intel-based supercomputer is expected to lead the next TOP500 list.
25%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
Rubén Llorente ... fails to complete. If the script does not work with your distribution, a manual install will be required [3]. The EasyInstall script has the following prerequisites: Apt or Yum package managers
25%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
Rubén Llorente ... iRedMail-related products. The downloadable installer is the product I focus on in this article. The free-tier product, licensed as free open source software under the GPL3, is a set of scripts
25%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... on top of the ruleset that limits its traffic to 1Mbps upload and 2Mbps download. Listing 3 Static DHCP Leases /ip dhcp-server lease add address=192.168.90.211 mac-address=b6:c2
25%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
Rubén Llorente ... is not verified. The purpose of this routine is to prevent man-in-the-middle (MITM) attacks. Sake uses the x/crypto/ssh Go package, which is a bit quirky [3]. An issue I stumbled on when testing Sake
25%
Hardware-enhanced security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Jeff Metzger, 123RF.com
Rubén Llorente ... application to interface with the Nitrokey. Thankfully, you are provided a free, open source program [3] that supports FreeBSD, macOS, Windows, and many Linux distributions. AppImages, Flatpaks, and Snaps

« Previous 1 2 3 4 5 6 7 8 ... 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice