Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 147 Next »

63%
Seven free blocking filters for ads
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © enciktep, 123RF.com
the ads. An ad filter can be applied to each individual device or make the ad invisible for all clients on a network at a central location. In this article, I compare ad blockers that run on the router ... We compare seven free blocking filters for advertisements and look at how they integrate into the network. ... Security, Open Source, network
63%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
In the past, many network administrators used pre-installed and expensive appliances for routing. Although this was used for a long time as a reliable solution, it is no longer suitable for more ... The FRR open routing stack can be integrated into many networks because it supports a large number of routing protocols, though its strong dependence on the underlying kernel means it requires some ... Virtualization, Routing, kernel virtualization, network
63%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
Virtual private networks (VPNs) connect remote offices over the Internet. However, when the number of offices increases, so does the number of VPN tunnels. Scaling becomes important when connecting ... The VyOS Linux distribution puts network routing, firewall, and VPN functionality together and presents a fully working dynamic multipoint VPN router as an alternative or addition to a Cisco DMVPN ... Linux, hardware, network
63%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
, Windows 10 v1607), you also need to complete some settings in the WSUS management console. Additionally, you need to add the new Group Policy templates (ADMX files) for Windows 10 v1607 [1] to your network ... WSUS simplifies updating Windows 10 computers over the network, but first, you need to modify some settings and add new Group Policy templates to insure successful installation of the updates. ... Windows, Server, network
63%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
-Shellcode cmdlet starts the machine in the process space of the current PowerShell. Finding Unknown Shares Network shares that are not inventoried, whose permissions structure is obsolete and point to users who ... Numerous PowerShell add-on modules provide security and attack functions for penetration tests and forensic analyses, to help admins search for vulnerabilities in their networks. ... Windows, Powershell, network, vulnerabilities
63%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
individual rooms. Support staff can also enter the general staff area in addition to the customer areas. Network administrators are also allowed to enter the rooms with the switches and routers in the data ... Microsoft, Kernel, network, security
63%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
Founded in 2003, US manufacturer Untangle Inc. offers a security solution in the form of NG Firewall [1] tailored to networks in small and medium-sized enterprises (or larger companies with many ... Security, network, Firewall
63%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
In the history of wireless networks, many innovations have already been exaggerated by providers as a major breakthrough yet, in the end, did not really meet the expectations of users. In the case ... network, wireless, WiFi
63%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
Domain controllers (DCs) are a central element of the network architecture; they manage the authentication and authorization of user identities and computers in a Windows domain. Attacks on DCs can ... Active Directory, Microsoft, network, security
63%
Server administration with Cockpit
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Photo by Joshua J. Cotten on Unsplash
Cockpit [1] offers a graphical user interface for managing servers that takes care of network configuration, displays the server load, starts and stops system services, manages users, and more. All ... Administration, Server, network

« Previous 1 2 3 4 5 6 7 8 9 10 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice