Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (246)
  • Article (10)
  • News (7)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 27 Next »

69%
Modern network diagnostics on Windows and Linux
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Nk Ni on Unsplash
In the evolving landscape of system administration and network diagnostics, legacy tools often give way to more efficient, modern alternatives. One such shift involves the deprecation of the widely ... Get-NetTCPConnection and ss are efficient and powerful tools for monitoring network connections and identifying potential security threats on Windows and Linux. ... Modern network diagnostics on Windows and Linux
62%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
Version 3.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network ... Performance problems with virtual servers on Hyper-V are often caused by a network access bottleneck, but various optimization settings can help speed things up. ... Optimizing Hyper-V network settings
62%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
With hardware and operating systems becoming increasingly complex, you need to improve your system and network administration skills constantly. The admin's daily grind involves deploying new tools ... Five special distros for system and network admins
62%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
A server can struggle for many reasons: System resources like the CPU, RAM, or hard disk space could be overloaded, or network services might have crashed. Depending on the applications that run ... Monitoring network computers with the Icinga Nagios fork
62%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
. Figure 1: AppLocker lets you restrict the ability to execute programs on enterprise networks. AppLocker also supports whitelists, blacklists, and combinations of rules. It can block applications ... Using AppLocker to block applications on networks
54%
State-of-the-art virtual private networks
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Maxim Kazmin, 123RF.com
Virtual private networks (VPNs) have established themselves as a standard solution for convenient remote access to enterprise networks. However, they can cause some issues in combination ... State-of-the-art virtual private networks
37%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
, click Networking | Check HTTP web service . Don't confuse this option with the old check (check_http), which is still available under Check HTTP service (deprecated) . In the simplest version ... Checkmk offers a new open source monitoring implementation for network services.
34%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ... Intruders rely on ARP cache poisoning to conceal their presence on a local network. We'll show you some tools an attacker might use to poison the ARP cache and gather information on your network.
34%
Configuring Windows with NetShell
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Kirsty Pargeterr, fotolia.com
) that can in turn be extended using the NetShell API. Among other tasks, NetShell lets you: Configure network interfaces Configure Windows Firewall Display various network parameters Configure ... Windows networks can be configured from a graphical interface, but if you want to explore all the functions, try using NetShell at the command line to configure TCP/IP stack parameters and network
34%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
Spacewalk [1] is the open source derivative of the popular Red Hat Network Satellite Server. Red Hat published the source code for the server in the summer of 2008, and the community has now ... As your network grows, managing Linux systems manually becomes time consuming and impractical. Enter Spacewalk: an open source tool that takes the footwork out of network management.

« Previous 1 2 3 4 5 6 7 8 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice