Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 149 Next »

27%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
flexibility to your data storage and retrieval policy is a network-attached storage (NAS) solution. With NAS, you can essentially share the storage with everyone on the network. More often than not, a typical ... Build a network-attached storage box with Rockstor to manage your data.
27%
Quantum AI Gets Easier
12.09.2022
Home »  HPC  »  News  » 
 
Los Alamos researchers prove that training a quantum neural network will require less data than originally assumed.
27%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
, click Networking | Check HTTP web service . Don't confuse this option with the old check (check_http), which is still available under Check HTTP service (deprecated) . In the simplest version ... Checkmk offers a new open source monitoring implementation for network services.
24%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
Today's communication networks are designed around the original mechanisms of Ethernet and TCP/IP. Because of the success of these early technologies, networks grew bigger and more complex, which ... Software Defined Networking (SDN) marks a paradigm shift toward a more holistic approach for managing networking hardware. The Floodlight OpenFlow controller offers an easy and inexpensive way
24%
All for Admins
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
In these pages, you'll learn about tools for configuring, managing, and troubleshooting your networks. You'll hear about cloud infrastructures, database systems, server plugins, and enterprise ... Our Admin special edition was so popular we're back, with a new quarterly magazine that is all for admins. Welcome to the first issue of Admin: Network and Security – a magazine for administrators
24%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ... Intruders rely on arp cache poisoning to conceal their presence on a local network. We'll show you some of the tools an attacker might use to poison the arp cache and gather information on your
24%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
management and discovery Log management Network management IDS (intrusion detection) HID (host intrusion detection) Vulnerability assessment Threat detection Behavioral monitoring ... Systems, network, and security professionals face a big problem managing disparate security data from a variety of sources. OSSIM gives IT security professionals the capacity to cut through the noise
24%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
, such attacks can reach bandwidths of 300GBps or more. Admins usually defend themselves by securing the external borders of their own networks and listening for unusual traffic signatures on the gateways ... OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
24%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
OCS Inventory NG (Next Generation)  [1] is an inventory system that gathers information about hardware and software running on your network. OCS uses an SNMP-based discovery mechanism to inventory ... If you want to manage large IT environments efficiently, you need automation. In this article, we describe how to transfer information automatically from the OCS network inventory system to the Open
24%
Subscribe
15.06.2011
Home » 
 
Click on the button to order single issues or a subscription to ADMIN Network & Security magazine   Order Now »   Please visit our online shop for your region to view our current ... Click on the button to order single issues or a subscription to ADMIN Network & Security magazine Order Now »

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice