Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: cache hand Play Together 1.22 0(711bmw.com)cache hand Play Together 1.22 0(711bmw.com)w0e ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (462)
  • Article (53)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 52 Next »

27%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
which makes HTTP/2 the preferred protocol if the client also supports that version; otherwise, the fallback is to HTTP/1.1. Downward Compatibility According to statistics from w3techs.com [4], a good ... HTTP/2 introduced multiplexing, resulting in superior bandwidth utilization over HTTP/1.1, and HTTP/3 solves the problem of transmission delays from packet loss by replacing TCP with QUIC. ... HTTP/1.1 versus HTTP/2 and HTTP/3
26%
Traffic analysis with mitmproxy
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © r lakhesis, 123RF.com
external access (e.g., NGINX, Squid, and WinGate come to mind). Given the name, mitmproxy [1] could be assumed to be in the same category. However, the tool takes a different approach by specializing in HTTP ... The mitmproxy tool puts interactive traffic analysis in your hands.
25%
Novell Filr 1.0 tested
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Illustrator, 123RF.com
/index.jsp Filr download page: https://www.novell.com/products/filr/novell_filr_download.html Filr documentation: http://www.novell.com/documentation/novell-filr1/ Novell Filr 1.0 Web Application User Guide ... Novell Filr 1.0 tested
25%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
of NAP are available for access protection, including: DHCP, VPN, IPSec, Terminal services (e.g., Remote Desktop Services), and IEEE 802.1X devices. This article relates to access via wired 802.1X devices ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they ... NAP with 802.1X ... Port-based access protection with NAP and 802.1X
25%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
: Router A will ask the central router for router B; with that information in hand, router A sets up a new VPN tunnel between A and B, so traffic can start flowing (Figure 1), automatically and without conf ... The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN
22%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
). Figure 1: An OpenStack standard setup uses at least four networks, each of which has a special role to play. The management network is the network that the physical servers in the Open ... The first article in this workshop looked at the theory behind OpenStack; the second part takes a more hands-on approach: How can you set up an OpenStack cloud on a greenfield site?
22%
From debugging to exploiting
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Maksim Kabou, 123RF.com
, a j value of 1,671,723,848 is already far beyond the last item in the vacf array, so the vacf[j-i] = 0 statement is trying to write at address 0xd49039e0. Because this address is far beyond the process ... Kernel and compiler security techniques, together with sound programming practices, fend off memory corruption exploits.
21%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
e37654:disk-0 iqn.2008-02.com.f-response.cr0wn-d00e37654:disk-1 iqn.2008-02.com.f-response.cr0wn-d00e37654:vol-c iqn.2008-02.com.f-response.cr0wn-d00e37654:vol-e iqn.2008-02.com ... Be ready before disaster strikes. In this article we describe some tools you should have on hand to obtain a memory image of an infected system.
20%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
to port 22 (i.e., the SSH port). Simple Mail Transfer Protocol (SMTP) ports 25 and 587 should be open. If you also intend to operate with Internet Message Access Protocol (IMAP) on the system, you need ... If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.
20%
Identity and access management with OpenIAM
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Chatree Jaiyangyuen, 123rf.com
offers two subscription models that provide access to additional resources and support beyond the software itself. The current 4.2.0.1 version (at press time) supports Red Hat Enterprise Linux 8 and Cent ... Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements

« Previous 1 2 3 4 5 6 7 8 9 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice