Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 232 Next »

12%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
after anonymization and providing protection against re-identification risks. At the same time, these techniques offer immense opportunities, particularly with a view to leveraging big data and machine
12%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
Intruders and penetration testers use a number of tools to obtain DNS information. Many of these tools are very familiar to IT professionals. Tools such as nslookup and dig provide information on domain names
12%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
and Microsoft systems as well. The Satellite Server is connected to the Internet and is registered with the Red Hat Network Server that provides patches. It is the only server connected to the Red Hat Network
12%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
the collected metrics data. If you think Netdata is a commercial provider, you are partly right. The complete software is available under a free license. Although a charge is levied for using the Netdata
12%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
. In this scenario, you connect your data centers (private cloud) with the resources of a public cloud provider. The term "private cloud" is somewhat misleading, in that the operation of many data centers has little
12%
A self-hosted server and site manager for WordPress
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Marek Ulliasz, 123RF.com
that are baked in and hidden from your average WordPress users. Another advantage is that the panels connect to server providers such as DigitalOcean, AWS, and others. The panels themselves do not sell server
12%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
If you are a system administrator of many systems, or even of just a desktop or laptop, you are likely monitoring your system in some fashion. This is particularly true in high-performance computing
12%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
. In this section, I show you how, with a little SSH tunneling and a little scripting. The scenario has a user that is using a Linux laptop or desktop (hereafter, computer) away from the cluster, but they can SSH
12%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
destination Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination On my laptop, an SSH server isn't installed automatically so I have
12%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
cloud provider. Amazon Web Services (AWS) [2] are A Closer Look Overall, the system is currently using four of the many services offered by Amazon. Each of these services is exposed through a web

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice