Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 174 Next »

23%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
The malware image I am using in this article is a variant found by the Palo Alto PA-5000 series firewall [5] on a Windows box in our network, which was sent for further investigation to a sandbox that Palo Alto ... We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network.
23%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
is available? Everyone will be familiar with the following situation: You are sitting comfortably in a cafe or hotel, registered on the local WiFi network, and happily browsing the Internet. However, you might ... Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
23%
Sharing threat information with MISP
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Ricardo Resende on Unsplash
extend to almost all threats to the IT infrastructure. The damage one individual suffers can help to protect other participants on a network if documentation is provided promptly and necessary information ... The Malware Information Sharing Platform lets you record and document security incidents – and share the information with users on other networks.
23%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity ... The Falco tool promises comprehensive threat detection for Docker, Podman, and Kubernetes from network traffic streams.
23%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
. It monitors network-attached servers, switches, applications, and services, generating alerts when things go wrong and again when the problem has been resolved. The Hardware I run NEMS on a Raspberry Pi 3 ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
23%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
supported OSs are Debian, CentOS, Red Hat Enterprise Linux, SUSE, and Windows [3]. Network: Specifies the network that traffic can access. In this example, default is correct. External IP: Specifies ... Google Compute Engine removes the technical and financial headaches of maintaining server, networking, and storage.
23%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
search for would-be attackers on your network. Detection Managing legacy intrusion detection and intrusion prevention systems involves a great deal of effort, partly because hybrid approaches consisting ... This traffic analysis software identifies malicious traffic on your network with the use of established sources.
23%
Unleashing Accelerated Speeds with RAM Drives
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Vladimir Nenov, 123RF.com
stats (read/write): rd0: ios=0/0, merge=0/0, ticks=0/0, in_queue=0, util=0.00% NVMe over Fabrics Network Sometimes it might be necessary to export those performant volumes across a network so ... Enable and share performant block devices across a network of compute nodes with the RapidDisk kernel RAM drive module.
23%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
to additional features that are missing in hardware-based solutions. GlusterFS puts you in a position to create a scalable, virtualized storage pool made up of regular storage systems grouped to form a network ... GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
23%
Monitor and optimize Fibre Channel SAN performance
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 3dkombinat, 123RF.com
on the storage area network (SAN). I talk about where it makes sense to influence the data stream and how possible bottlenecks can be detected at an early stage. To this end, I will be determining the critically ... We discuss the possible bottlenecks in Fibre Channel storage area networks and how to resolve them.

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice