Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • News (5)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

27%
Modern network diagnostics
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Paul Aniszewski, 123RF.com
, which might not be desirable in bandwidth-constrained environments. Additionally, some network devices might be configured to deprioritize or drop ICMP traffic, which can lead to inaccurate results
27%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
leading to what are inscrutable instructions in the eyes of the original domain experts. Furthermore, these strategies perform vastly differently depending on the underlying system architecture, ranging
27%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
the load on the system, what’s running on the system, and how to stop a process, which leads to some understanding of what processes are run by root and what processes are run by users. Again, Windows
27%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
be configured and then monitored. Bit by bit, a schemata of your environment develops, which usually leads to a better understanding of your IT environment than would be possible with a patchwork of independent
27%
Touring SUSE's new cloud product
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
cloud product sets out to provide this kind of convenience. SUSE Linux Enterprise Server (SLES) is the system behind the SUSE cloud service, which leads to easy integration for companies that are already
27%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
candidate) Meg Whitman as the new CEO. The announcement drew a mixed response, with many onlookers praising Whitman's past success in leading eBay from startup to world resale phenomenon. Others suggested
27%
Installing your own Git server
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Guido Vrol, 123RF.com
the two programs in their package repositories, which makes the install very easy. The two tools use different installation approaches, thus leading to different configuration steps. The basic requirements
27%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
for network vulnerabilities; however, several of the leading intrusion detection and protection systems are capable of alerting the network owner when a scan is in process. Rather than scanning for an open port
27%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
important in the event of a site connection failure. In many IT organizations, traditional AD is still the leading identity store, but most logins take place against cloud directories such as Entra ID
27%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
the traffic specifically for suspiciously long domain names or attempts to download EXE files. The disadvantage here is that heuristics can lead to a noticeable increase in false positives. You can use

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice