Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 149 Next »

14%
Fedora 33 Server (full install)
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
that will not upset your established application or language stack, and Cockpit [2] presents system tasks in a web browser, allowing you to start and stop containers, administer storage, configure networks, and inspect
14%
Ubuntu Server 21.04 (Live)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
-enabled advanced networking stack Updated toolchain needrestart installed by default Stability updates to the HA stack Extended attributes in NFS
14%
Kali Linux 2020.1 (Live)
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
in earlier versions. Live network install image. Default Xfce desktop. Rolling distribution, so you get updates as soon as they are available. Python 2 tools removed because Python 2 reached end
14%
Clonezilla 2.6.3-7 (Live)
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
-to-sector with dd. Based on the Debian Sid repository (as of September 3, 2019) Linux kernel updated to 5.2.9-2 Supports most Linux, macOS, Windows, network, and virtual filesystems Bootable on a BIOS
14%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-based attacks Flood the network with traffic to overload the bandwidth. Network bandwidth DDoS UDP/ICMP flooding Send a large number of UDP/ICMP packets to overload the target
14%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
Many different tools on the market help enterprise security teams monitor security-related log and network data, with a view to detecting and analyzing acute threats and attacks
14%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
. For example, the classic tool only supports its own virtual private network (VPN) protocol and does not offer support for natively integrated VPN clients from Android, iOS, macOS, and Windows. Fast Soft
14%
Bpfilter offers a new approach to packet filtering in Linux
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © alphaspirit, 123RF.com
Netfilter [1], the most important tool on Linux for inspecting packets from the network, does not have a very good reputation. It is regarded as old-fashioned and inefficient, and the associated
14%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
shares, particularly mapping network drives, or connecting a network printer and setting the default printer. For local systems, it might be necessary to run programs, change a registry key, or create
14%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
in the next issue with a survey of network monitoring tools adopting in-terminal graphics [6]. Two years later, I revisit the subject to witness the impressive improvement of the state of the art taking place

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice