Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (6)
  • News (2)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 Next »

67%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
Technology Levels Description Perimeter protection 0, 1, 3, 4 The entire network is secured by strictly controlling and monitoring access from outside, which is particularly
67%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
. This prevents the sender from filling up the cache too quickly. Port Scanners Nmap [3], which recently went to version 5.0, is the Swiss army knife of port scanners. Portbunny [4] is a relatively new tool ... 0
67%
Manage and automate networks
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
create workflows that react dynamically to events. Before I show you exactly how this works with the free open source tool, which is available under the Apache 2.0 license, I'll take a brief look at its
67%
The logging module in Python
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© svl861, 123RF.com
. In Python 2.3, the logging module [3] was finally added to the standard library, so assuming you have Python in place, you have nothing to install. To use the module, import it at the start of a script, like
67%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
army knife for debugging, testing, data protection analysis, and penetration testing HTTP(S) connections. I show you how mitmproxy can be a useful addition to your security toolbox. Man in the Middle
67%
Configuration management with Chef
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alistair Cotton, 123RF.com
lines on each of the systems involved: file_cache_path "/tmp/chef-solo" cookbook_path "/tmp/chef-solo/cookbooks" recipe_url "http://s3.amazonaws.com/chef-solo/bootstrap-latest.tar.gz" This tells Chef
67%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.3.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size 256 This check would give you a pretty good
67%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
I think virtually everyone in HPC knows the Warewulf open source cluster provisioning and management tool. I wrote about Warewulf starting with Warewulf 3, followed by a series on Warewulf 4. Since
67%
Security without firewalls
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© rukanoga, 123RF.com
/24, \ 1.2.3.4/32, 21.21.21.0/19 IP addresses hosts.allow can be set to accept connections from hostnames, too. One example might be ALL: *.domain.tld or you might have an administrative group
66%
Installing and managing thedistributed GlusterFS filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Tetiana Pustovoitova, 123RF.com
FS website even has prebuilt packages for CentOS 5.7 and 6.x, Debian 5.0.3, Fedora 11 and 16, and Ubuntu 11.10. Users with any other distribution will need to turn to the source code, but the installation

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice