Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 178 179 180 181 182 183 184 185 186 187 188 189 190 191 ... 208 Next »

12%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
1) [1], providing me yet another unnecessary opportunity to procrastinate. What followed was one of the most interesting Twitter threads in performance-tuning in recent memory and a great practical
12%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
providers are probably already working with Varnish, seeking to deliver their data as quickly as possible across continents. How this works is shown by a few VCL examples, in which Varnish plays out its speed
12%
Scanning servers with Nikto
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © spleen87, photocase.com
holes. By fixing these misconfigurations or previously unknown issues on your web servers, you can cover your tracks to provide a more robust security posture. Setting Sail Nikto [1] holds nothing back
12%
Successful protocol analysis in modern network structures
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © konstantynov, 123RF.com
-VM traffic flows need to be forwarded to the monitoring and analysis application. Virtualization solution vendors provide guest access to a virtual network adapter for this purpose. This access to the data
12%
A Bash-based monitoring tool
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © citalliance, 123RF.com
], is a bit more interactive than top, but it provides very similar information. htop uses ncurses for the interface but reads the data from /proc, as top does. It has a nice graph at the top of the default
12%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
. The query-based approach to inspecting system state is all the more remarkable when applied to fleets of machines or public cloud instances. Analytics platform vendors like Uptycs [10] provide a way
12%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
in practice, not least because of the DNS extension's complexity. For example, if you look at an end user, a recursive DNS request is usually made to the DNS resolver at the user's Internet service provider
12%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
process into routing tables and firewall rules. Network information was distributed across all sorts of devices. Consumers (business processes) and service providers (network administrators) spoke
12%
Manage resources with AWS CloudFormation
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © krisckam, 123RF.com
of development processes advocated by the DevOps movement. Infrastructure as code is a way to simplify the development process, reducing the dependency of developers on infrastructure teams to provide
12%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
cannot replace a full backup of your virtual servers, but it can provide valuable assistance for replicating your most critical VMs to other hosts on the network or dumping backup copies on a network

« Previous 1 ... 178 179 180 181 182 183 184 185 186 187 188 189 190 191 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice