Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 Next »

27%
Privacy Policy
24.05.2018
Home » 
 
how to exercise your options in this regard. 2. General information and mandatory information Data protection The operators of this website take the protection of your personal data very seriously
27%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
port, though, which all the other test candidates have (Table 3), and the selection of USB ports is also not very generous. However, the web GUI with its stylish design and ease of use can compensate
27%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
created might help your VA. The term "mapping," when referring to vulnerability scanners, typically implies a very simple TCP, UDP, or ICMP scan to discover devices on the network. With these details
27%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
eavesdropping on the data or injecting packets. When the transport is secure, you should focus on routing. All VPN gateways must announce their connected IP subnets. Static routing is possible, but very time
27%
EGroupware, Group Office, and Kopano compared
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © 36clicks, 123RF.com
of EGroupware, so that the participants have the same rights in e-learning as on the conventional desktop. The e-learning interface has a very simple structure for the learners: It divides the work area into two
27%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
and Pennsylvania State University examined SSD failures in data centers [3]. Over nearly three years they examined about 500,000 SSDs from five very large data centers and several edge data centers. The drives were
27%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
, but it is worth learning the basics, at the very least. Exploring the options in the useful crictl tool and looking at how runc can be used to diagnose issues is a valuable exercise in itself. In your next hour
27%
Improving performance with environment variables
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © sgame, fotolia.com
.387979 The strange "blurp" in the results for N =512 I cannot explain, but it happens very frequently. Notice the strange results at N =256 and N =512 that also happened when using the CPU. For the CPU results
27%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
drive, does not create any new processes, and therefore ideally does not leave any permanent traces. Forensic experts call this a very small forensic footprint, but it can spill over into other running
27%
Credential management with HashiCorp Vault
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
is very detailed and contains information about the login credentials used. However, Vault hashes these by default using SHA256 and a salt, so they do not end up in plain text in the logs. Conclusions Far

« Previous 1 ... 127 128 129 130 131 132 133 134 135 136 137 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice