Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (44)
  • Article (5)
  • News (4)
Keywords

« Previous 1 2 3 4 5 6 Next »

23%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
An analysis of the critical networking components to optimize the performance and security of Linux workloads on Azure includes a look at virtual networks (VNets), network security groups (NSGs
23%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-specific timeouts globally across the server or for individual virtual hosts. The following line tells Apache to wait a maximum of 10 seconds to receive header data; the limit is set at 30 seconds; and the wait
23%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
All of your systems seem to be working normally, but virtually nobody has placed an order in the online store since yesterday afternoon. A painstaking manual investigation reveals that the shopping
23%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
virtual IP). For example, if your single-node setup is running on kube.demo.com with the IP address 192.168.1.1, you need to resolve all sub-domains (*.kube.demo.com) to 192.168.1.1, too. The router
23%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
on trusted networks. Control access to device Virtual Teletype (VTY) lines with an ACL to restrict inbound lateral movement connections. If using Simple Network Management Protocol (SNMP), ensure only
23%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
or in a virtual machine; then, they should start learning more and more about Linux before jumping into HPC. This article is about what I think are the base commands someone should know, as well as some secondary
22%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
be pre-filled. Authentication can also be tied to a specific device (device-specific authentication). However, the process has its downsides because, even in this age of virtually unlimited storage space
22%
The Resurrection of bWatch
02.06.2025
Home »  Articles  » 
Photo by NASA Hubble Space Telescope on Unsplash
) or a parallel virtual machine (PVM), and Linux. With Beowulf, everything was new. Previous HPC systems all had proprietary tools to manage and monitor servers (nodes) in the cluster, so the tools for Beowulf
22%
Tools for hardware diagnostics under Windows
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © blas, Fotolia.com
and read error rates, storage space, buffer sizes, firmware version, serial number, and operating hours of the hard drive. Figure 3: Virtually no other tool
22%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
. The developers claim that a virtually arbitrary number of events can be analyzed and processed thanks to the use of compression techniques. In principle, you can also use the sensor as a standalone environment

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice