Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 98 Next »

12%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
time, certain connections need to work immediately, securely, and reliably (see the "But of course!" box). The number of examples of the need to find new methods for managing networks could go on and on ... Networking is a central focus of IT. With all the virtual machines running on today's networks, it stands to reason that the experts would someday find a way to virtualize the network itself
12%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
available through the test drive GUI explains how this works. All told, testers can put RHSS through its paces for 15 hours, divided into three separate test runs, each lasting no longer than five hours ... If you believe Red Hat's marketing hype, the company has no less than revolutionized data storage with version 2.1 of its Storage Server. The facts tell a rather different story.
12%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
. Infos Paxson, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks , 1999;31(23-24):2435-2463, https://www.icir.org/vern/papers/bro-CN99.pdf Zeek packages: https ... Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.
12%
OpenCanary attack detection
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
generate an alert for each event, you will miss the actual attacks in the mess of data. OpenCanary offers genuine added value if you run it on your internal network. Once an attacker has penetrated ... The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.
12%
PowerShell Part 3: Keeping PowerShell in the Loop
10.05.2012
Home »  Articles  » 
 
PowerShell’s automation capability saves time and effort when you need information from multiple systems. ... comparatively simple Linux Bash script that reads in a text file (systems.txt ) one line at a time, performs an operation (echos the system name) on each line, then exits. The file is a list of systems. while ... PowerShell’s ability to use loops extends its reach to remote systems and performs repetitive operations.
12%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
; then, it will have to retry its original request. This behavior amplifies the load on the server with only minimal effort on the attacker's part. At a time when web applications tend to run ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way.
12%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
data in real time, rather than relying on historic data. This data is already outdated in many scenarios and no longer of any value. Additionally, users of BI applications have varying requirements ... JBoss Data Virtualization software applications receive a uniform interface to all data – regardless of its source.
12%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
is licensed via the User Subscription License (USL). Here, you need to assign a license to each user. This license gives users the ability to access online services in Office 365 as well as internal server
12%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
As a host-based intrusion detection system (HIDS), OSSEC [1] detects and reacts to security incidents in real time. The software is capable of detecting a wide range of security incidents, including ... The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file
12%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
that Python code is generally quite readable, which significantly increases its recyclability. Unlike other programming languages, which sometimes make excessive use of brackets and semicolons – and where ... Although PowerShell has its ardent advocates, many admins and users swear by Python, especially for Windows. Which scripting language is best for you? Read on for a comparison of Power

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice