Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (46)
  • Article (6)
  • News (2)
Keywords

« Previous 1 2 3 4 5 6 Next »

68%
Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
05.12.2024
Home »  News  » 
 
Management Protocol (SNMP), ensure only SNMP v3 with encryption and authentication is used, along with ACL protections against unnecessary public exposure. Disable all unnecessary discovery protocols
68%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
Technology Levels Description Perimeter protection 0, 1, 3, 4 The entire network is secured by strictly controlling and monitoring access from outside, which is particularly
68%
Improved logging in Samba Winbind
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © monsit jangariyawong, 123RF.com
:20:51.998105, 3, pid=1153814, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:502(process_request_send) process_request_send: [nss_winbind (1153856)] Handling async request: GETPWNAM
68%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
executable content No 3b576869-a4ec-4529-8536-b80a7769e899 Stops Office applications from inserting code into child processes No 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84
67%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
67%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
.yaml cluster: name: kubernetes k8sServiceHost: 10.124.0.3 k8sServicePort: 6443 kubeProxyReplacement: strict operator: replicas: 1 ipam: mode: "cluster-pool" operator: clusterPoolIPv4Pod
67%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
the interception certificate. Mitmproxy generates the interception certificate and continues the client SSL/TLS handshake interrupted in step 3. The client sends the request through the open connection
67%
The best performance yet
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lucy Baldwin, 123RF.com
Recently, I analyzed the performance of new storage options on Raspberry Pi 5 boards [1], focusing on the Pi 5's USB bus improvements (the USB 3 ports are now independently capable of 5Gbps each
67%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
; processes known as mongos route queries to the correct shard. The config server's metadata makes sure this happens. © MongoDB [3] Version 8.0 of MongoDB introduced embedded config servers, which means
66%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
-in package managers. Table 1 Rsync vs. Rclone Feature Rsync Rclone License GPLv3 MIT Intended use Data backup between two computers or servers

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice