Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 147 Next »

24%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
The malware image I am using in this article is a variant found by the Palo Alto PA-5000 series firewall [5] on a Windows box in our network, which was sent for further investigation to a sandbox that Palo Alto ... We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
24%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
is available? Everyone will be familiar with the following situation: You are sitting comfortably in a cafe or hotel, registered on the local WiFi network, and happily browsing the Internet. However, you might ... Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
24%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
extend to almost all threats to the IT infrastructure. The damage one individual suffers can help to protect other participants on a network if documentation is provided promptly and necessary information ... The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.
24%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
. It monitors network-attached servers, switches, applications, and services, generating alerts when things go wrong and again when the problem has been resolved. The Hardware I run NEMS on a Raspberry Pi 3 ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
24%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
supported OSs are Debian, CentOS, Red Hat Enterprise Linux, SUSE, and Windows [3]. Network: Specifies the network that traffic can access. In this example, default is correct. External IP: Specifies ... Google Compute Engine removes the technical and financial headaches of maintaining server, networking, and storage.
24%
Unleashing Accelerated Speeds with RAM Drives
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Vladimir Nenov, 123RF.com
stats (read/write): rd0: ios=0/0, merge=0/0, ticks=0/0, in_queue=0, util=0.00% NVMe over Fabrics Network Sometimes it might be necessary to export those performant volumes across a network so ... Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
24%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
to additional features that are missing in hardware-based solutions. GlusterFS puts you in a position to create a scalable, virtualized storage pool made up of regular storage systems grouped to form a network ... GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
24%
Monitor and optimize Fibre Channel SAN performance
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 3dkombinat, 123RF.com
on the storage area network (SAN). I talk about where it makes sense to influence the data stream and how possible bottlenecks can be detected at an early stage. To this end, I will be determining the critically ... We discuss the possible bottlenecks in Fibre Channel storage area networks and how to resolve them.
24%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
standard used throughout the world. With Perl sockets, you can communicate with any computer that is connected by the Internet or a network. To communicate with this other computer, you specify the server ... Perl sockets work like file handles that can span across a network or the entire Internet.
23%
OpenStack Releases Essex
19.04.2012
Home »  News  » 
 
-managed computing, storage, and networking resources to build efficient, automated private and public cloud infrastructures. The Essex release delivers user-requested features for improved automation, integration ... OpenStack announces the release of Essex, community-driven software that allows users to leverage pools of on-demand, self-managed computing, storage, and networking resources.

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice