Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 147 Next »

64%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
authentication, authorization, and accounting. RADIUS is often used in combination with access points, VPNs, and other technologies in which the protocol controls the dial-in or login to a computer network ... Server, network, authentication, protocol ... Network Policy Server ... Microsoft Network Policy Server
63%
Monitor your network
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Endrille, Fotolia
The Pandora Flexible Monitoring Solution (FMS) [1] is a full-featured network monitoring system. It equips system and network administrators with an information-rich dashboard that they can use ... Use the open source Pandora FMS monitoring server to keep an eye on all the computers and network devices in your realm. ... Monitoring, Administration, network monitoring tools, network ... Monitor your network
63%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
, Windows, and related IoT systems) for information in the network "interstice," which is where one technology connects to and works with another technology. Hackers take advantage of interstices. If you ... To thwart credential harvesters at the network interstice, you must understand how attackers exploit browser transactions. ... Web, attack, browser, network ... Credential harvesting at the network interstice
63%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
as in ChatGPT. Note that the data does not remain on your network; instead, Copilot phones home to Microsoft. Copilot is based on GPT-4, but Microsoft has stated that it will not transfer any data to Open ... to know how to control or even block its use on the network. ... Microsoft, network, Artificial Intelligence ... Managing GPT-4 on the Network
63%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
central switches and adding more switches if the number of ports on a switch is not sufficient. Together, the switches and network adapters form a large physical segment in OSI Layer 2 ... Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly ... Virtualization, Routing, network, scalability ... Scalable network infrastructure in Layer 3 with BGP
63%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
Access control is a standard feature of networks, with a general need to reconcile strict security requirements with a greater diversity and larger number of terminal devices, even in times ... Cisco's Identity Services Engine offers a scalable approach to network access control for a variety of devices. ... network, Cisco IOS, enterprise ... Network access control with Cisco's Identity Services Engine
63%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
Because of the way people perceive speech, Voice over Internet Protocol (VoIP) is a transmission-sensitive application that requires certain conditions in the network. Finding and fixing network ... A special VoIP analyzer lets you control the available bandwidth and quality of voice transmission by monitoring relevant network parameters. ... Monitoring, network, bandwidth, VoIP ... Troubleshooting and analyzing VoIP networks
63%
Software-defined wide area networks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © ktsdesign, 123RF.com
, the question arises as to how such basic structures as wide area network (WAN) routes can be virtualized and what their inherent benefits might be. A software-defined WAN (SD-WAN) comprises multiple components ... A natural consequence of software-defined storage and software-defined data centers is the software-defined wide area network, or the Internet connections between locations and cloud services. ... tunneling, software, network, management ... Software-defined wide area networks
63%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
Virtual LANs (VLANs) are used widely in modern network infrastructures. A VLAN can divide a physical LAN into small pieces of virtual LAN to contain broadcast traffic in a limited, reasonable range ... Cisco's VLAN Trunking Protocol for Virtual LAN management in medium to large computer networks can make a network administrator's life easier. ... Virtualization, Administration, tools, network
63%
Link aggregation with kernel bonding and the Team daemon
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Steven Cukrov, 123rf.com
No matter how many network interfaces a server has and how the admin combines them, hardware alone is not enough. To turn multiple network cards into a true failover solution or a fat data provider ... The Linux world has different implementations for integrating multiple network cards: kernel old-timer ifenslave and the younger libteam. ... Linux, Administration, Kernel, network

« Previous 1 2 3 4 5 6 7 8 9 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice