Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (264)
  • News (12)
  • Article (10)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 29 Next »

62%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network ... Performance problems with virtual servers on Hyper-V are often caused by a network access bottleneck, but various optimization settings can help speed things up. ... Optimizing Hyper-V network settings
61%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
A server can struggle for many reasons: System resources like the CPU, RAM, or hard disk space could be overloaded, or network services might have crashed. Depending on the applications that run ... Monitoring network computers with the Icinga Nagios fork
61%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
. Figure 1: AppLocker lets you restrict the ability to execute programs on enterprise networks. AppLocker also supports whitelists, blacklists, and combinations of rules. It can block applications ... Using AppLocker to block applications on networks
57%
Palo Alto Networks Introduces Cortex Cloud
28.02.2025
Home »  News  » 
 
Palo Alto Networks has released Cortex Cloud, which merges Prisma Cloud with Cortex CDR. This new version offers cloud detection and response capabilities along with AI-powered prioritization ... Palo Alto Networks Introduces Cortex Cloud
54%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
Virtual private networks (VPNs) have established themselves as a standard solution for convenient remote access to enterprise networks. However, they can cause some issues in combination ... State-of-the-art virtual private networks
53%
DigitalOcean Kubernetes Service Doubles Cluster Capacity
08.04.2025
Home »  News  » 
 
: Increased cluster capacity from 500 to 1,000 worker nodes per cluster. Optimized networking with VPC-native Kubernetes. Improved performance with eBPF-powered networking. Managed Cilium for high ... Enhancements include improved networking and performance.
48%
IP Fabric 7.0 Released
21.02.2025
Home »  News  » 
 
IP Fabric has announced the 7.0 release of its Automated Network Assurance Platform, which aims to provide the necessary insight and control to manage complex cloud, security, and network ... Check out the updates to the Automated Network Assurance Platform.
47%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
The Internet small computer systems interface (iSCSI) [1] is a block-level [2] interfacing protocol used in conjunction with any network-attached storage (NAS) unit. As the name implies, iSCSI uses ... The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI. ... Storage across the network with iSCSI and Synology DiskStation Manager
37%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
, click Networking | Check HTTP web service . Don't confuse this option with the old check (check_http), which is still available under Check HTTP service (deprecated) . In the simplest version ... Checkmk offers a new open source monitoring implementation for network services.
34%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ... Intruders rely on ARP cache poisoning to conceal their presence on a local network. We'll show you some tools an attacker might use to poison the ARP cache and gather information on your network.

« Previous 1 2 3 4 5 6 7 8 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice