Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 148 Next »

14%
DOE Envisions New High Performance Data Facility
12.04.2023
Home »  News  » 
 
located in one of its HPC labs that connects out through spokes of network to storage and computation in the other centers,” reports Timothy Prickett Morgan. “The DOE envisions the hub and spoke model
14%
Check Out 2024 Linux Highlights from LWN
23.01.2025
Home »  News  » 
 
of news stories published on the LWN website in 2024, including items such as: The passing of David Mills, inventor of the Network Time Protocol (NTP). The Linux kernel became a CNA. CentOS Linux
14%
BackBox Linux
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
If your IT infrastructure is way too complex, take back your box with BackBox Linux. With minimal resources and time, you can test your entire network and manage large security assessments. Back
14%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
In the past, network attackers were much like purse grabbers or "smash and grab" muggers: They would find something they wanted, grab the goods, and run. Today's Advance Persistent Threats (APT
14%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
install for RHVH with Anaconda, which is a matter of a few mouse clicks. Next, sign up with the subscription manager on the Red Hat Content Delivery Network (CDN). An RHVH always automatically subscribes
14%
Fedora 20
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
detection Network statistics Password cracking Reconnaissance Wireless analysis Web app testing VoIP traffic generation
14%
SystemRescueCd (Live, 64-bit)
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
and GPLv3 license. It supports numerous filesystems (e.g., ext3/ext4, XFS, Btrfs, ReiserFS, JFS, VFAT, NTFS), including network filesystems such as Samba and NFS. The new version 6.0.3 is updated to Linux
14%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
install a temporary local boot medium (e.g., a USB stick) manually, that's precisely what you would want to avoid. An alternative approach to installing the system would be booting via a network – not a new
14%
On the DVD
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
for privacy include: Iceweasel web browser with HTTPS Everywhere Pidgin messenger Claws mail client KeePassX password manager GnuPG data encryption I2P anonymizing network TrueCrypt disk
14%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
to increase detection accuracy and avoid network disruption. Each alarm from AlienVault USM includes detailed and customized instructions on how to investigate and respond to the detected threat. A free trial

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice