Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1045)
  • News (229)
  • Article (225)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 151 Next »

24%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
the data streams. However, developers have come up with a solution for this analysis problem: a virtual switch with an integrated span port. This setup lets administrators define a network interface ... Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.
24%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
If you are responsible for protecting the corporate infrastructure, you probably have various security products in use to support you in this task – with a distinction made between network and host ... How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
24%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
The malware image I am using in this article is a variant found by the Palo Alto PA-5000 series firewall [5] on a Windows box in our network, which was sent for further investigation to a sandbox that Palo Alto ... We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
24%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
is available? Everyone will be familiar with the following situation: You are sitting comfortably in a cafe or hotel, registered on the local WiFi network, and happily browsing the Internet. However, you might ... Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
24%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
extend to almost all threats to the IT infrastructure. The damage one individual suffers can help to protect other participants on a network if documentation is provided promptly and necessary information ... The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.
24%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity ... The Falco tool promises comprehensive threat detection for Docker, Podman, and Kubernetes from network traffic streams.
24%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
. It monitors network-attached servers, switches, applications, and services, generating alerts when things go wrong and again when the problem has been resolved. The Hardware I run NEMS on a Raspberry Pi 3 ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
24%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
supported OSs are Debian, CentOS, Red Hat Enterprise Linux, SUSE, and Windows [3]. Network: Specifies the network that traffic can access. In this example, default is correct. External IP: Specifies ... Google Compute Engine removes the technical and financial headaches of maintaining server, networking, and storage.
24%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
search for would-be attackers on your network. Detection Managing legacy intrusion detection and intrusion prevention systems involves a great deal of effort, partly because hybrid approaches consisting ... This traffic analysis software identifies malicious traffic on your network with the use of established sources.
24%
Unleashing Accelerated Speeds with RAM Drives
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Vladimir Nenov, 123RF.com
stats (read/write): rd0: ios=0/0, merge=0/0, ticks=0/0, in_queue=0, util=0.00% NVMe over Fabrics Network Sometimes it might be necessary to export those performant volumes across a network so ... Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 151 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice