Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (136)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 14 Next »

30%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in particular – to identify their attack surfaces more precisely and respond more quickly to changes in their risk situation (see the "Prevention and NIS2" box). In their Leadership Compass publications on ASM [1 ... The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
30%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
passed from the hands of Internet authorities. Regional registries now hold all remaining Class A address blocks, and they are expected to run out in a few months. The vast majority of ISPs still do ... The next generation of Internet connectivity
29%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
. Listing 1 A SIP Request 01 INVITE sip:bob@tuwien.ac.at SIP/2.0 02 Via: SIP/2.0/UDP myhost.myprovider.de;branch=z9hG4bK776asdhds 03 ... 04 To: Bob 05 ... 06 From: Alice Internet Telephony (SPIT) is regarded as the next generation of spam. In this article, we investigate SPIT and point out countermeasures for admins with VoIP servers. ... 0 ... Spam over Internet Telephony
25%
Microsoft System Center Virtual Machine Manager 2008 R2
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Tono Balaguer, 123RF.com
or 2.0; Windows Remote Management (WinRM) 1.1 or 2.0; and the .NET framework 3.0 (SP1). The web-based SCVMM Self-Service Portal additionally requires Internet Information Server (IIS) version 7.0 or 7 ... Microsoft System Center Virtual Machine Manager 2008 R2
25%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Dmitry Tsvetkov, 123RF.com
(0x0000003c0d200000) 11 libgcc_s.so.1 => /lib64/libgcc_s.so.1 (0x00007f086f4d5000) 12 libc.so.6 => /lib64/libc.so.6 (0x0000003c0ca00000) 13 /lib64/ld-linux-x86-64.so.2 (0x0000003c0c600000 ... VMware Server 2.0 on recent Linux distributions
21%
Setting up your own NAS with FreeNAS 8.0.2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Vitalii Gulenok, 123RF.com
. Future version numbers of FreeNAS will reflect the FreeBSD version on which the system builds. This explains why the developers moved from 0.7 to 8.0.2 and will be sticking to this schema in future. New ... Setting up your own NAS with FreeNAS 8.0.2
14%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
. On the other hand, you need to tell DRBD what to do if a split-brain situation occurs by adding following lines after-sb-0pri discard-zero-changes; after-sb-1pri discard-secondary; after-sb-2pri disconnect ... Cl uster filesystems such as GFS2 and OCFS2 allow many clients simultaneous access to a storage device. Along with DRBD and Pacemaker, this offers a low-budget option for creating a redundant service
14%
Shell access via a web browser
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Roman Pyshchyk, 123RF.com
Functions" box gives more details. A shellinaboxd process can provide multiple services, such as logging in to multiple computers, shellinaboxd -s /host1/:SSH:host.example.com -s /host2/:SSH:host2.example.com ... PHP Shell and Shell In A Box put a shell in your browser, thus facilitating web server management – even from the nearest Internet cafÈ and without SSH access.
13%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
When IT teams set out to monitor the Internet of Things (IoT), they too often settle for situations where, say, a networked sensor sends plausible measurements at an expected interval, which ... Keeping track of a large number of Internet of Things devices means understanding IoT networks, developing suitable monitoring metrics, and (ideally) integrating the IoT with infrastructure
12%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home »  Archive  »  2025  »  Issue 90 VoIP N...  » 
Photo by Quino Al on Unsplash
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:6f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port

« Previous 1 2 3 4 5 6 7 8 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice