Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 174 Next »

14%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
a heartbeat across the network at regular intervals. Alternatively, some implementations store status messages or run heuristics, such as pinging a central router. If the vital signs from a cluster node
14%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
to preempt the hackers and identify and close the gaps. Kali Linux can help. To maintain the security of a network, you need to check it continuously for vulnerabilities and other weak points through
14%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
Bro [1] is high-quality security monitoring tool designed to discover and analyze traffic trends on your network. Bro provides in-depth analysis of network traffic without limiting itself
14%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
. Iomega Announces EZ Media Iomega Corporation recently announced the new Iomega StorCenter ix2 Network Storage, an advanced two-bay desktop network storage device. The ix2 is available in multiple
14%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Tormod Rossavik, 123RF.com
a complete system for this purpose. Additionally, you will want to configure the network on the host. To do this, you need to install the following additional packages: debootstrap, bridge-utils, and libcap2
14%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
NetScaler is a network product that works as an application accelerator and firewall. In other words, integration of the product into the enterprise is best handled by networking experts, because
14%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
acceptable. The next step is to go beyond a list of commands and emphasize HPC concepts that go along with the commands. Networking In undergraduate engineering, faculty always advise you to take more math
14%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
of the setup that are responsible for collecting and managing hardware nodes: For example, a new computer receives a response from a MAAS server when it sends a PXE request after first starting up its network
14%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
Centralized storage in the form of network-attached storage (NAS) or a storage area network (SAN) are implicitly or explicitly set in stone in the data center. Wherever you look, you will likely
14%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
of an archeological excavation site than a technology company. Wrapped up in this dilemma is enterprise devotion to endpoint security in a local network, which encounters problems when administering clients outside

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice