Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 58 Next »

32%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
is called end-to-end (E2E) monitoring (Figure 1) and is primarily used for web applications (see the "Confusion of Terms" box). However, it can also be used for native Linux programs and smartphone apps. E2E
32%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
” of something like addition, multiplication, and so on. The explanation of this process is fairly well treated online. You must follow five different rules for rounding: Round to the nearest value, ties
32%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
requires appropriate tools (e.g., the well-known IDA Pro [1]). For sandboxing, you install the software within a secure environment, often a virtual machine or hardware appliance (e.g., FireEye [2] is a well
32%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
and – at the end – the leaf of the tree. A rather short OID could be .1.3.6.1.2.1.31. There is an analogy to IP addresses here: Because it's difficult to remember an IP address as a series of numbers, the Domain
32%
Microsegmentation with VMware NSX and vRealize Automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © hketch, photocase.com
of the dialog, you need to enable the Deploy NSX Edge option. In the settings dialog box, specify a username, a password, and the SSH settings. Check the Enable Auto Rule Generation box and click Next
32%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
image: The injured party created a dd image of his server and saved the image to a hard disk connected to a FreeNAS [2] system, which is based on BSD. The idea was for experts to analyze the server image
32%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
of all: the ability to run your own scripts and thus automate various scanning and analysis tasks. The scripts are based on the Lua programming language [2], which is easy to learn and perfect
32%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
to a remote block device – specifically, an NVMe target. (2) The target will be the server exporting the NVMe device across the network and to the host server. A Linux 5.0 or later kernel is required on both
32%
Retention labels in Office 365
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © stokkete, 123RF.com
Office 365 plans, not all features are supported by all plans [2]. Most of the functions I will look at here are available starting in enterprise plan E3, but some of them start from E5. Microsoft
32%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.0 (SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice