Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 154 Next »

14%
BackBox Linux
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
If your IT infrastructure is way too complex, take back your box with BackBox Linux. With minimal resources and time, you can test your entire network and manage large security assessments. Back
14%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
In the past, network attackers were much like purse grabbers or "smash and grab" muggers: They would find something they wanted, grab the goods, and run. Today's Advance Persistent Threats (APT
14%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
install for RHVH with Anaconda, which is a matter of a few mouse clicks. Next, sign up with the subscription manager on the Red Hat Content Delivery Network (CDN). An RHVH always automatically subscribes
14%
Fedora 20
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
detection Network statistics Password cracking Reconnaissance Wireless analysis Web app testing VoIP traffic generation
14%
SystemRescueCd (Live, 64-bit)
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
and GPLv3 license. It supports numerous filesystems (e.g., ext3/ext4, XFS, Btrfs, ReiserFS, JFS, VFAT, NTFS), including network filesystems such as Samba and NFS. The new version 6.0.3 is updated to Linux
14%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
install a temporary local boot medium (e.g., a USB stick) manually, that's precisely what you would want to avoid. An alternative approach to installing the system would be booting via a network – not a new
14%
On the DVD
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
for privacy include: Iceweasel web browser with HTTPS Everywhere Pidgin messenger Claws mail client KeePassX password manager GnuPG data encryption I2P anonymizing network TrueCrypt disk
14%
New Products
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
to increase detection accuracy and avoid network disruption. Each alarm from AlienVault USM includes detailed and customized instructions on how to investigate and respond to the detected threat. A free trial
14%
Data Center Transformation: The End of IT?
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © zelfit, 123RF.com
updates for the server's hardware, you have to update the blade enclosure's BIOS, the virtual console's BIOS, the network module's BIOS, each blade's BIOS, and still update your blade's operating systems
14%
On the CD
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
the tools you need to deploy a complex network of services, with the ability to build highly available, secure, and flexible OpenStack production clouds and to collaborate with VMware vSphere. Freely

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice