Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 174 Next »

43%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
exactly do you need to understand these solutions? Devices and Networks XDR as a term emerged in 2018 and is attributed to software vendor Palo Alto Networks. As the term implies, it is about extending ... Extended detection and response (XDR) integrates security functions across endpoint devices and networks. But is XDR the only integrated approach to cybersecurity challenges? We investigate the new ... Extended detection and response in networks, endpoint devices, and the cloud
43%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
Network device inventory is one of those common pain points that affects every system administrator who has ever tried to script or invent a custom solution. System inventory escapes even the most ... Ease your network inventory pain with Spiceworks
43%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
With hardware and operating systems becoming increasingly complex, you need to improve your system and network administration skills constantly. The admin's daily grind involves deploying new tools ... Five special distros for system and network admins
43%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
A server can struggle for many reasons: System resources like the CPU, RAM, or hard disk space could be overloaded, or network services might have crashed. Depending on the applications that run ... Monitoring network computers with the Icinga Nagios fork
43%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
. Figure 1: AppLocker lets you restrict the ability to execute programs on enterprise networks. AppLocker also supports whitelists, blacklists, and combinations of rules. It can block applications ... Using AppLocker to block applications on networks
40%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
GlusterFS stores data across the network and can be used as a storage back end in cloud environments. ... to additional features that are missing in hardware-based solutions. GlusterFS puts you in a position to create a scalable, virtualized storage pool made up of regular storage systems grouped to form a network ... GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
40%
NSA Issues Zero Trust Guidelines for Network Security
18.03.2024
Home »  News  » 
 
The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) with recommendations for strengthening internal network control and containing network intrusions using Zero ... NSA Issues Zero Trust Guidelines for Network Security
40%
Palo Alto Networks Introduces Cortex Cloud
28.02.2025
Home »  News  » 
 
Palo Alto Networks has released Cortex Cloud, which merges Prisma Cloud with Cortex CDR. This new version offers cloud detection and response capabilities along with AI-powered prioritization ... Palo Alto Networks Introduces Cortex Cloud
40%
Juniper Networks upgrade Mykonos Web Security Software
06.06.2012
Home »  News  » 
 
Juniper Networks announced major enhancements to its Mykonos Web Security Software, which uses the company’s Intrusion Deception Technology to defend against web-based threats in real ... Juniper Networks upgrade Mykonos Web Security Software
40%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Organizations today often divide their local networks using switches, which operate Layer 2 of the OSI model, rather than the (Layer 3) routers for which the TCP/IP network protocol system ... Ethernet is so popular because it simply works and is inexpensive. However, the administration side looks a bit more complicated: For the network to run smoothly, the admin might need to make ... How the Spanning Tree protocol organizes an Ethernet network

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice