Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (85)
  • Article (12)
  • News (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

90%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
– at least if browsers support it. The server can use the "Public Key Pinning Extension for HTTP" (RFC 7469) [4] to specify for a certain period which public keys need to be included when testing a certificate
90%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
More than 20 years having passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites. ... on optimizing TCP. As connections grow faster, say the Google techies, a faster TCP protocol will remove the need to close the initial congestion window in TCP after four packets, as required by RFC 3390. In some ... More than 20 years have passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites. ... SPDY: Google HTTP Protocol
90%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
if the requester is not on the list. The procedure was specified in RFC 6844 back in 2013 [2]. Nevertheless, its use is not particularly widespread, although since support for wildcard certificates was introduced
90%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
on the network that communicates via IPv4 or IPv6. This includes normal workstations and servers as well as routers. RFC 4213 (Basic Transition Mechanisms for IPv6 Hosts and Routers) describes the following node
90%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
by the Internet Engineering Task Force (IETF) in RFC7348 [1]. Figure 2: A spine-leaf design with VXLAN overlay: Host A and host B can reside on the same subnet
90%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
. At the top of the tree is SNMPv2-SMI (Structure of Management Information): Compliant to the specifications in RFC 2578 [1], it defines the .iso.org.dod.internet (.1.3.6.1) sub-tree, under which, the sub
89%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
establishes the authenticity of its counterpart by the trust-on-first-use (TOFU) principle. According to RFC 4251 [1], TOFU is required to maintain a decentralized database (e.g., the text file known
89%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
://skaya.enix.org/vpn/zebra.html RIP Version 2: http://tools.ietf.org/html/rfc2453 RIPng: http://tools.ietf.org/html/rfc2080 OSPF for IPv4: http://tools.ietf.org/html/rfc2328 OSPF for IPv6: http://tools.ietf.org/html/rfc5340
89%
Enterprise communication with IRC
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© anyka, 123RF.com
countless IRC server variants. Almost all originate from the original code, which is still in use today on IRCNet [1] and comes closest to the original IRC RFC [2]. Additionally, you will find a plethora
89%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
access . The approach is the same in both cases, and I will thus only be looking at full network access in the following discussion. The properties to be defined are specified by a RFC [2]. Press

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice