Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last week
Sort order
  • Date
  • Score
Content type
  • Article (Print) (173)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 18 Next »

34%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ... Intruders rely on ARP cache poisoning to conceal their presence on a local network. We'll show you some tools an attacker might use to poison the ARP cache and gather information on your network.
34%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
) that can in turn be extended using the NetShell API. Among other tasks, NetShell lets you: Configure network interfaces Configure Windows Firewall Display various network parameters Configure ... Windows networks can be configured from a graphical interface, but if you want to explore all the functions, try using NetShell at the command line to configure TCP/IP stack parameters and network
34%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
Spacewalk [1] is the open source derivative of the popular Red Hat Network Satellite Server. Red Hat published the source code for the server in the summer of 2008, and the community has now ... As your network grows, managing Linux systems manually becomes time consuming and impractical. Enter Spacewalk: an open source tool that takes the footwork out of network management.
31%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
Network Access Protection (NAP) was introduced with Windows Server 2008 and gives the network administrator the ability to check a client's security status on network access. This process involves ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they
31%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
the advantage of never needing to transmit the password across the network, and tickets provide a single sign-on (SSO) option for users. In other words, once a user has authenticated against the Kerberos server ... Mobile users need a connection to the LDAP and Kerberos servers to authenticate over insecure IP networks. The System Security Services Daemon (SSSD) helps plug this gap.
31%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
your attention: In the Bacula system, each task is handled by a separate program. Tasks can include reading the data to be backed up and transferring them across the network, writing to the backup media ... Everybody needs backups; if you are looking for an open source program that will back up heterogeneous networks, you should check out Bacula.
29%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
whether IPv6 can provide a full-fledged alternative to IPv4 on today's networks. Despite my initial euphoria, reality hit me hard during my testing sessions and turned this article into a report about my ... Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only LAN
29%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
managed switches support link aggregation, you should look at the data sheet to be sure. The same is true for IP-based iSCSI and NFS/CIFS storage systems. Servers need at least two network cards ... For once, admins and users agree: They want more resiliency and higher bandwidth on the network. Link aggregation, in line with IEEE 802.1ax b-2008, offers both – with some minor restrictions.
29%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
it to a network repository. Once the patch is in the repository, the admin then tests the patch in a test or development environment. If any issues arise with the patch, the admin contacts whoever issued the patch ... Keep your whole network up to date with Satellite Server – an enterprise-ready patch management system closely tied to Red Hat's prolific update service.
29%
Managing virtual machines
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Igor Klimov, 123RF.com
directly, but they use the network subsystem and are thus slower. Even with the potential detour of converting the qcow2 image to raw with qemu-img convert, you will still save a fair amount of time ... on the network.

« Previous 1 2 3 4 5 6 7 8 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice