Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 154 Next »

14%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
in a single Linux distribution.   BackTrack Linux is a fine example of a specialized Linux distribution. Its only purpose is to test your network, devices, and systems for security vulnerabilities. Back
14%
Routing with Quagga
19.02.2013
Home »  Articles  » 
Complex, redundant networks, such as the Internet, require different routing policies from those typically found on a LAN. Ideally, the routers will know all the paths that lead to the target
14%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
Infrastructure The same basic rules apply to OpenStack environments as for any conventional setup: Redundant power and a redundant network are mandatory. When it comes to network hardware in particular, you
14%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
Imagine that you are working in your home office with your tablet, which is connected to your home's wireless network. You leave the house for the airport, and while you're traveling in a taxi
14%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
Complex, redundant networks, such as the Internet, require different routing policies from those typically found on a LAN. Ideally, the routers will know all the paths that lead to the target
14%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
security agencies have warned that Chinese state hackers (https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/) "have compromised networks of major
14%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
and launched projects to match. The steps from the basic model to a concrete implementation are painstaking, partly because the model was initially very network-centric (zero trust networks) and primarily
14%
Devilish DNS Attack Compromises 300,000 SoHo Routers
04.03.2014
Home »  News  » 
 
passwords and banking information or push rootkit-style intrusion tools onto the victim's network. According to the report, most of the victims discovered so far are in Asia and Europe, however
14%
Penguin Puts MATLAB in the Cloud
07.05.2014
Home »  HPC  »  News  » 
 
offers cloud storage, and their website includes tutorials for getting their tools to work in the Amazon EC2 cloud. A ready-made solution in Penguin’s POD service network will help to extend the powerful
14%
HP and NVidia Announce GPU Technical Center
25.09.2013
Home »  HPC  »  News  » 
 
for cancer." In addition to on-site services, the center will support remote access through the Internet through the HPC network. A sophisticated virtualization architecture will allow users to experiment

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice