Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 70 Next »

6%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
the performance characteristics of Solr and Lucene. The Regain [5] project was another product that used Lucene as a search engine on the desktop. However, it was discontinued after the release of version 2.1.0
6%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
is that companies need to invest more in their email security; in particular, protection against phishing attacks need significant improvement. This is where phishing penetration testing comes in: Gophish [2
6%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
source project, smartmontools [2], allows you to interact with the S.M.A.R.T. data in drives on your systems. Using this tool, you can query the drives to gather information about them, or you can test ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S.M.A.R.T. features ... S.M.A.R.T., smartmontools, and drive monitoring
6%
Capsicum – Additional seasoning for FreeBSD
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
in a loop. Thus, the application can be switched to Capsicum capability mode with just two additional lines of program code: if (cap_enter() < 0) error("cap_enter: %s",pcap_strerror(errno)); The following
6%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
://www.juniper.net/techpubs/en_US/junos-puppet1.0/topics/task/installation/automation-junos-puppet-agent-installing.html Chef for Cisco: https://github.com/cisco/cisco-network-chef-cookbook Ansible for NX-OS: https://github.com/jedelman8
6%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
been offering 400Gbps switches (Figure 2), with research targeting 800Gbps and more. Slow and Old Fashioned If you want systems to use Ethernet to access storage, they need a protocol
6%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
need to set up (in the simplest case) a number of elements. To begin, configure a route to the Internet gateway by setting a route to CIDR range 0.0.0.0/0 as the Next Hop Internet Gateway; then you need
6%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
of your choosing, select the server to use (in this case, I have only one), and on the right-hand side, select the Assets or Networks you want to scan. As seen in Figure  9, the scan produced output
6%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
Active: >10W; sleep: 1W Active 10-15W; sleep: 0.86W Active: 7.2W; sleep: 1.8W Size (LxWxH): 140x42x198mm 227x82x231mm 191x97x266mm 225x47x200mm 119x
6%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
RR can be removed as soon as its DNS time to live (TTL) has expired. Listing 2 Fingerprint in the TLSA RR $ dig TLSA _25._tcp.mail.sys4.de +short 3 0 1 9273B4E9040C1B9EE7C946EFC0BA8AAF2C

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice