Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (948)
  • Article (319)
  • News (109)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 138 Next »

17%
Artificial admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Maxim Basinski, 123RF.com
of service (DDoS) attack is imminent by looking at the monitor with the RRD data of the installation in question. If they have to deal with thousands of servers and countless network devices, though
17%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
.g., tools such as Canonical's MaaS (metal as a service) or Foreman to handle lifecycle management for physical servers), Spacelift has stated that it does not want to go down these paths. Native integration
17%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
attacks on their own resources, comprehensive network monitoring using only honeypots is hardly practicable. To increase the honeypot’s visibility, you could add more honeypots to a network, or assign
17%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue
17%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
connections with Gzip, HTTP URL rewrites, and rate limiting to counter distributed denial of service (DDoS) attacks. Because the program has been capable of multithreading for several years, it benefits from
17%
Monitoring and service discovery with Consul
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Joshua Earle on Unsplash
service ensures that virtual setups expand and contract as needed; the provider markets the corresponding functionality under the name Auto Scaling [3]. However, it is practically impossible to use
17%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
as a network address translation (NAT) device. The new NAT module extends the virtual switch from pure Layer 2 management to partial Layer 3 integration. With the new feature, the switch can forward network
17%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
follows the company's "2024 Cloud-Native Security and Usage Report" (https://sysdig.com/s-2024-cloud-native-security-and-usage-report/) from earlier this year, which highlighted other security threats
17%
Putting an Active Directory domain controller in the Azure cloud
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sergey Nivens, 123RF.com
will find it easier to develop naming conventions. See the Azure Infrastructure Services Implementation Guidelines for more information [3]. Extend On-Premises AD toward Azure Suppose you want
17%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
. Some reference tables can be synchronized with multiple regions. With a replication factor (RF)=3 across three data centers or availability zones, the database can be used even if one of the data centers

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice