Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 148 Next »

14%
SystemRescue 9.04 (Live)
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
SystemRescue [1] was formerly known as SystemRescueCd, the classic Linux system Live boot rescue CD-ROM. A full complement of disk management tools, network admin programs, and text editors let you
14%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
The activity of penetration testing has been around for decades, but the past five years or so have seen radical changes in networking, beginning with the dissolved perimeter. Remember the good days
14%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
as authorization entries. Listing 2 shows a rule that lets user klaus change the global network settings in Network Manager. Listing 2: Rules for LocalAuthority [Klaus is allowed to modify network settings
14%
On the ground at the Linux Foundation's signature event
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Swapnil Bhartiya and Brian Behlendorf, Hyperledger Project
created Storj when he was trying to scratch his own itch of finding inexpensive and safe cloud storage solutions. Storj is building an Airbnb-like service for users with surplus storage and networking
14%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
some interesting innovations for the VM hardware. For example, it will be possible in the future to add virtual network adapters or memory to a virtual machine during operation and to remove
14%
Tech News:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
. Nikita Buchka wrote on a blog post, "Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves the network." The trojan deploys
14%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
Tcpdump is a widely used and powerful tool that captures, parses, and analyzes network traffic. Created by the Network Research Group at Lawrence Berkeley National Laboratory, Berkeley, California
14%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
Unified Threat Management (UTM) stands for complete protection. UTM systems filter incoming and outgoing network traffic, detect and prevent attacks, and block and quarantine viruses
14%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
The network service handles all tasks related to software-defined networking (SDN) in OpenStack. Ceilometer The metering component was introduced in the Havana release and supports detailed
14%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
Manager) scheme. After choosing the country, timezone, and keyboard layout, specifying the administrative password and manually setting your IPv4 network parameters (Figure 3), the installer unpacks

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice