Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (9)
  • News (7)
Keywords

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

16%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
for the first time, it downloads the available block and reputation lists to the local system, which you can monitor easily in a terminal window. After launching the server, you can access Maltrail in the web
16%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
-based access monitoring on the switch. Now, you need to specify for each switch port you will be using that it is an access port with 802.1X port monitoring – as you can see for the Fastethernet0/1 port
16%
Managing VHD devices
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Roman Smitko, 123RF
conversion tools are available, administrators still depend on a virtual machine monitor and are thus forced to opt for one format. Setting Up VHD Disks You can easily create and mount a VHD file using
16%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© victoroancea, 123RF.com
come not as Windows files or Linux packages, but as vSphere Installation Bundles (VIBs); moreover, software components for hardware monitoring and configuration (known as CIM providers) are provided
16%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
: Multi-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto
16%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
." The product comprises anti-malware, web reputation, firewall, intrusion detection, integrity monitoring, and log inspection modules in one integrated solution. Deep Security 9 also enables compliance with many
16%
Open source data center virtualization with OpenNebula
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
/one/oned.conf) to ensure correct addressing of the host system. In KVM's case, communications are handled by libvirt, which acts as an interface and handles administrative and monitoring functions. Even though Open
16%
Link aggregation boosts securityand increases throughput
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© zentilia, 123RF.com
of hardware monitoring, virtualization, I/O performance, and high availability.
16%
SQL Server 2008 R2 news
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
mtr, 123RF
. Figure 2: SQL Server Report Builder 3.0 lets users generate reports in a GUI. StreamInsight is an event processing platform that helps administrators monitor and analyze data and show business
16%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
monitor interval="120s" 02 primitive p_controld_gfs ocf:pacemaker:controld params daemon="gfs_controld.pcmk" args="" op monitor interval="120s" 03 clone cl_controld_dlm p_controld_dlm meta globally

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice