Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (119)
  • Article (1)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 13 Next »

17%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
-based approach alone is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods
16%
Life on the Network
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Jesse lee Lang, 123RF
and OpenVZ virtualization. You'll also find a study of how to monitor virtual environments with Nagios and Icinga, and we include separate articles on top virtualization tools like KVM, Hyper-V, Xen
16%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Snort IDS and monitoring Tor Browser Anonymity TrueCrypt Disk encryption Wireshark Sniffer
16%
Looking for System Admins …
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Piter Ivanov, 123RF
monitoring, clustering, and troubleshooting – for admins who manage Windows, Linux, Unix, and Solaris systems in heterogeneous environments. In these pages, you'll learn about some new features of the Windows
16%
Acceptable Risk
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Andrew Brown, 123RF.com
secret and to maintain a high level of personal security: locking their laptops, preventing over-the-shoulder spying, using a secure VPN connection, keeping anti-virus programs up-to-date, and leaving
16%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
users or computers from a specific profile. Additionally, you can specify whether the assignment should apply to workstations, laptops, or servers or just to machines with specific versions of Windows
16%
Nagios author Ethan Galstad
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
for computer science, but I also liked hardware and networking. My first job was as a network administrator, but I actually liked developing software, and that's I think why a monitoring solution like Nagios
16%
BackTrack 5 R2
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
Wireless traffic monitor Quypt Terminal emulator Wireshark Packet analyzer Infos BackTrack website: http://www.backtrack-linux.org/ BackTrack wiki: http
16%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
 
and monitoring jobs in PBS Professional clusters. Additionally, Altair has released the PBS Desktop app, which is a job submission tool for supporting PBS Professional jobs from the desktop. PBS Desktop, which
16%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
. In the Toolbox System administrators require a complete set of tools on any device used for support. Up to now, the support burden rested on the laptop computer. The tablet, as a support device, must have

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 13 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice