Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 174 Next »

23%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
impressive functionality. I'm sure you could name a few ubiquitous networking packages that the majority of admins might have used in the past. I'm thinking, for example, about userland packages like ngrep ... The outstanding Netcat is often referred to as the Swiss Army Knife of networking; to say that it is versatile is the biggest understatement you will hear in a while.
23%
Internet socket programming in Perl
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © higyou, 123RF.com
standard used throughout the world. With Perl sockets, you can communicate with any computer that is connected by the Internet or a network. To communicate with this other computer, you specify the server ... Perl sockets work like file handles that can span across a network or the entire Internet.
23%
OpenStack Releases Essex
19.04.2012
Home »  News  » 
 
-managed computing, storage, and networking resources to build efficient, automated private and public cloud infrastructures. The Essex release delivers user-requested features for improved automation, integration ... OpenStack announces the release of Essex, community-driven software that allows users to leverage pools of on-demand, self-managed computing, storage, and networking resources.
23%
OpenDNS Releases DNSCrypt
13.12.2011
Home »  News  » 
 
OpenDNS, a leading provider of DNS services, has released an open source tool to encrypt DNS traffic to protect network connections between the user’s computer and the company’s servers.
22%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
Network Access Protection (NAP) was introduced with Windows Server 2008 and gives the network administrator the ability to check a client's security status on network access. This process involves ... Mobile devices require special security considerations. In combination with IEEE 802.1X, Network Access Protection can ensure that mobile devices maintain the necessary security standards before they
22%
News for Admins
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
 
that campaign, hackers scanned up to 59,000 IP networks for exposed API endpoints. Once attackers located an exposed endpoint, an Alpine Linux OS container was deployed to run the command chroot /mnt /bin/sh -c ... In the news: Canonical now offers an Ubuntu Pro image for AWS; Vulnerable Docker instance sought out by Monero malware; Cumulus Networks enhances their network-specific Linux; and SUSE adds SUSE
22%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
The Domain Name System (DNS) puts you in a position to contain the spread of malware and prevent suspicious activities within your corporate network and, with appropriate filters on your DNS server ... The Domain Name System is repeatedly the target of or is leveraged for attacks on corporate infrastructures; however, it also lets you protect corporate networks against attacks and malware
22%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
infrastructure, architecture, products, and network configuration. The actions required to discover this information might seem harmless and might even be overlooked by security administrators as “network noise ... Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network’s security. We’ll show you some tools intruders use to gather
22%
networkd and nspawn in systemd
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kritiya Sumpun, 123RF.com
version to make working with them far easier in some cases. Setting Up Bridge Devices The systemd-networkd network manager can now handle a variety of different network devices; its feature set has been ... Version 219 of the controversial init system, systemd, comes with a few major changes. We look at the new features in network management and container handling.
22%
The TensorFlow AI framework
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lassedesignen, Fotolia.com
does machine learning actually mean in a technical sense? What is deep learning, and how does a neural network work? All these concepts appear regularly in the TensorFlow context, and without ... The TensorFlow symbolic math library can help you introduce artificial intelligence, deep learning, and neural networks into your projects.

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice