Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (264)
  • News (12)
  • Article (10)
Keywords

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 29 Next »

19%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
Most admins are well aware of IPsec, the powerful protocol used to encrypt network traffic over TCP/IP networks. IPsec is often used with VPN connections to join remote LANs through a private tunnel
19%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
A penetration tester simulates an attack on a customer's network by trying to find a way inside. Many such attacks begin with the use of a scanning tool, such as Nexpose, Nessus, or Nmap, to look
19%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
In a jungle of shares and network drives, it's easy to lose track – Where exactly are those templates for vacation application forms? Libraries let you collate different storage locations to create
19%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
, admins face limited bandwidth for network-based data transfer. Additionally, they need to worry about data security and protection requirements, the increasing need for automation, huge mountains
19%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
, and streamlined operations. With seamless integration into Azure services and hybrid cloud connectivity to enterprise networks, Microsoft Dev Box is a good choice for organizations looking to improve collaboration
19%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
SUSE) already provide inherent load balancing capabilities for most network services, such as web, cache, mail, FTP, media, and VoIP. These inherent capabilities are based on Layer 4 switching, allowing Linux
19%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
The Network Mapper, or Nmap [1], is one of the most popular network scanners available. System administrators and security specialists use Nmap for network scanning, discovery, and inventories. Nmap
19%
El Capitan Heads the Latest TOP500 Supercomputer List
02.12.2024
Home »  News  » 
 
,039,616 combined CPU and GPU cores and is based on AMD 4th generation EPYC processors and AMD Instinct MI300A accelerators. It uses the Cray Slingshot 11 network for data transfer. El Capitan also achieved an energy
19%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
with the use of the built-in validation logic. The choices that Desktop Authority offers administrators creating profiles are versatile and leave little to be desired, whether you need to assign network
19%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
This issue features a free DVD with NodeZero Linux, a "pentest" distro containing more than 300 tools for network penetration testing. NodeZero's Live boot option lets you boot from the DVD without

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice