Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (465)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 56 Next »

6%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
of your choosing, select the server to use (in this case, I have only one), and on the right-hand side, select the Assets or Networks you want to scan. As seen in Figure  9, the scan produced output
6%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
Flow switches. If you do not have any OpenFlow-enabled hardware right now, you can simulate an OpenFlow network with the free MiniNet software. Again, installing from GitHub is recommended: $ git clone git://github.com
6%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
Active: >10W; sleep: 1W Active 10-15W; sleep: 0.86W Active: 7.2W; sleep: 1.8W Size (LxWxH): 140x42x198mm 227x82x231mm 191x97x266mm 225x47x200mm 119x
6%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
. Figure 1: The analysis platform retrieves data from the routers in the network and on the network edge to detect possible DDoS attacks. In most cases, the Internet connection depends on the day ... OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network. ... DDoS protection in the cloud
6%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
6%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
implementations on Intel and AMD only support 2^48 bytes [4]. Virtual and Physical If software – including the Linux kernel itself in this case – wants to access the memory contents, the virtual addresses must
6%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
is '^]'. 220 smtp.gmail.com ESMTP x20sm3297437wrg.52 - gsmtp    HELP    214 2.0.0 https://www.google.com/search?btnI=RFC+5321 x20sm3297437wrg.52 - gsmtp    QUIT    221 2.0.0 closing connection x20sm3297437
6%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
open source tools are provided to ensure no license problems or restrictions. TurnKey Linux (TKL) is based on Debian 7.2 and thus provides business applications and security updates for more than 37
6%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
and a Fedora 36 VM as a simulated edge device. Infos Ansible and containers: https://www.ansible.com/blog/ansible-and-containers-why-and-how Kind: https://kind.sigs.k8s.io Open Cluster
6%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
/products/yubikey-hardware/yubikey-neo/yubikey-neo-u2f/ S3 Authentication Suite: https://www.noknok.com/what-we-do/technology

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice