Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 149 Next »

19%
CentOS 7-1708 and Tails 3.5
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
designed for easy access to the TOR anonymity network. The TOR network lets the privacy-conscious user surf the web invisibly without fear of identification. The latest Tails release includes version 7 ... system designed for easy access to the TOR anonymity network.
19%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
Nessus is a network and vulnerability scanner for Windows, Linux, Unix, and Mac OS X computers. The software relies on the client/server principle; one Nessus server on the network runs nessusd ... To ensure your servers and workstations are well protected against attacks on your network, you need a professional security scanner. In version 6, Tenable has substantially expanded its Nessus
19%
CentOS 7 (1511) and Rockstor 3.8
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
 
for identity management, containers, and software-defined networking. Rockstor 3.8 Rockstor is a specialty Linux distro designed to support Btrfs-based network-attached storage (NAS) devices. You can set up ... to support Btrfs-based network-attached storage (NAS) devices.
19%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
protocol, attached to HTTP(S), accepts requests on defined ports via a listener. The guest and host are thus confined to communicating through some form of virtual networking. Another option for VM ... to configure a virtual network connection.
19%
Fedora 21 Server Edition
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
 
Hat. With Fedora's rapid release schedule, you get the latest in virtualization, networking, and other technologies. The 64-bit Server version on this DVD is aimed at system administrators ... The Fedora Project is a free software community sponsored by Red Hat. With Fedora's rapid release schedule, you get the latest in virtualization, networking, and other technologies. The 64-bit Server
19%
Affordable hardware switch for SDN
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © plus69, 123RF.com
-label switches with PicOS) cost a solid, four-figure sum and are thus prohibitively expensive for a small test lab. Northbound Networks [3], with the aid of a Kickstarter campaign, has developed the inexpensive ... Most OpenFlow-ready hardware switches are prohibitively expensive if you just want to set up a small-scale test lab. Northbound Networks has stepped in with a Kickstarter campaign, filling the gap
19%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
SQL database from the cloud into their own network without having to worry about the server settings. Microsoft is responsible for maintaining, backing up, and updating the database server. If you opt ... Wherever Microsoft SQL Server runs on local networks, individual or all databases can be migrated to Azure SQL by transactional replication. Various opportunities unfold, including analytics
19%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
’Reilly Media founder Tim O’Reilly, Bradley Horowitz, Google Vice President of Product Management, explained the launch of the new social media network. In the interview, Horowitz says that Google+ use has been ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google
19%
NetFlow reporting with Google Analytics
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Qi Feng, 123RF.com
Cisco IOS NetFlow [1] collects IP traffic statistics at network interfaces, providing a valuable source of information to system administrators who want to gain in-depth insights into the activities ... network. We show you how to use Google Analytics to capture and analyze NetFlow data.
19%
News for Admins
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
 
Networks Breached Citrix, a software giant that offers a wide range of products and services, admitted that its networks were breached (https://www.citrix.com/blogs/2019/03/08/citrix-investigating-unauthorized-access-to-internal-network ... F5 Acquires NGINX for $670 Million; No One Is Safe – Citrix Networks Breached; A 19-Year-Old Bug in WinRAR; An Image Can Compromise Your Android Device and LibreOffice Vulnerable to Remote Code

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice