Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 179 180 181 182 183 184 185 186 187 188 189 190 191 192 ... 199 Next »

8%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
results of XDR (Figure 2) can be divided into three groups. The events shown in black are clear and known threats. Ideally, the response can be automatic (e.g., by redirecting the event to decoy systems
8%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
logging, aimed primarily at Kubernetes users who are already using Prometheus [2]. Loki claims to avoid much of the overhead that is a fixed part of ELK. In terms of functionality, the product can't keep
8%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
such a hacker currently proceed in practice? In principle, an attack always follows the same phases: 1. Break-in 2. Persistence 3. Preparatory work (lateral movement) 4. Perseverance and system surveillance
8%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
the user interface (Figure 2). Intuitive and efficient handling of the SIEM GUI is thus typically an important acceptance criterion for a SIEM product – unresponsive web interfaces or the lack of support
8%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
methods in machine learning. The following sections illustrate the different forms of analysis by assessing the load curve of a server processor (Figure 2). The load remains below 50 percent over
8%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
, Michael, and Doug. They, and others, are the unsung heroes putting this party together. SCinet and Power One thing I learned this year is that SCinet [2], which was used for Internet access during
8%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
images, note that SUSE offers the Elemental toolkit [2] for this purpose. The images can then be used to establish lean K3s cluster nodes, for example. The Harvester distribution combines an Elemental
8%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
The initial version 6 of PowerCLI, the Windows PowerShell interface for managing VMware vSphere, appeared in March 2015 to coincide with the release of vSphere 6.0. In mid-September 2015, release 2
8%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
of the gridded assembly area. Double-clicking on the component opens a new dialog box in which you should define the properties of the component (Figure 2). The definitions include the path to the input file
8%
Microsegmentation with VMware NSX and vRealize Automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © hketch, photocase.com
in the graphical user interface. When you get there, edit the corresponding vSphere endpoint (Figure 2). Now check the Specify Manager for Network and Security Platform box, enter the URL of the NSX Manager below

« Previous 1 ... 179 180 181 182 183 184 185 186 187 188 189 190 191 192 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice