Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1247)
  • News (231)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 171 Next »

24%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
OCS Inventory NG (Next Generation)  [1] is an inventory system that gathers information about hardware and software running on your network. OCS uses an SNMP-based discovery mechanism to inventory ... If you want to manage large IT environments efficiently, you need automation. In this article, we describe how to transfer information automatically from the OCS network inventory system to the Open
24%
Managing Linux systems with Spacewalk
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© patrimonio designs, Fotolia.com
Spacewalk [1] is the open source derivative of the popular Red Hat Network Satellite Server. Red Hat published the source code for the server in the summer of 2008, and the community has now ... As your network grows, managing Linux systems manually becomes time consuming and impractical. Enter Spacewalk: an open source tool that takes the footwork out of network management.
23%
Subscribe
15.06.2011
Home » 
 
Click on the button to order single issues or a subscription to ADMIN Network & Security magazine   Order Now »   Please visit our online shop for your region to view our current ... Click on the button to order single issues or a subscription to ADMIN Network & Security magazine Order Now »
23%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
the data streams. However, developers have come up with a solution for this analysis problem: a virtual switch with an integrated span port. This setup lets administrators define a network interface ... Network information in virtualized computer landscapes is not easy to access. In this article, we look at a few approaches you can use.
23%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
If you are responsible for protecting the corporate infrastructure, you probably have various security products in use to support you in this task – with a distinction made between network and host ... How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
23%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
The malware image I am using in this article is a variant found by the Palo Alto PA-5000 series firewall [5] on a Windows box in our network, which was sent for further investigation to a sandbox that Palo Alto ... We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
23%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
is available? Everyone will be familiar with the following situation: You are sitting comfortably in a cafe or hotel, registered on the local WiFi network, and happily browsing the Internet. However, you might ... Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
23%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
extend to almost all threats to the IT infrastructure. The damage one individual suffers can help to protect other participants on a network if documentation is provided promptly and necessary information ... The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.
23%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity ... The Falco tool promises comprehensive threat detection for Docker, Podman, and Kubernetes from network traffic streams.
23%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
. It monitors network-attached servers, switches, applications, and services, generating alerts when things go wrong and again when the problem has been resolved. The Hardware I run NEMS on a Raspberry Pi 3 ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice