Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 174 Next »

14%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
as authorization entries. Listing 2 shows a rule that lets user klaus change the global network settings in Network Manager. Listing 2: Rules for LocalAuthority [Klaus is allowed to modify network settings
14%
On the ground at the Linux Foundation's signature event
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Swapnil Bhartiya and Brian Behlendorf, Hyperledger Project
created Storj when he was trying to scratch his own itch of finding inexpensive and safe cloud storage solutions. Storj is building an Airbnb-like service for users with surplus storage and networking
14%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
some interesting innovations for the VM hardware. For example, it will be possible in the future to add virtual network adapters or memory to a virtual machine during operation and to remove
14%
Tech News:
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
. Nikita Buchka wrote on a blog post, "Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves the network." The trojan deploys
14%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
an agent, but this approach has its downside. For example, all the data in the backup needs to cross the network wire to the backup server, and if you don't have a dedicated connection, impairments
14%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
, and non-profit organizations. According to the company, ClearOS Professional 6 is an affordable and powerful network, gateway, and server OS providing critical security and management tools – including
14%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
(SIEM), and mobile device management (MDM); you use network address translation (NAT), require a virtual private network (VPN) for remote connectivity, keep all your systems updated, keep an application
14%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
A Domain Name System (DNS) name resolution configuration that is not carefully considered or simply incorrect will tend to cause a variety of problems on a network. Unstable server-based services
14%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
, auto-discovery, auto-configuration, self-forming networks, IPSec, etc.). Why You Care about IPv6 IPv4 has been in use since 1981 and is beginning to show its age, especially in one critical area
14%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
Tcpdump is a widely used and powerful tool that captures, parses, and analyzes network traffic. Created by the Network Research Group at Lawrence Berkeley National Laboratory, Berkeley, California

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice