Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 67 Next »

13%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
://hadoop.apache.org/ YARN: http://hadoop.apache.org/docs/r2.3.0/hadoop-yarn/hadoop-yarn-site/YARN.html Kognitio: http://kognitio.com Archer Technologies: http://www.archerits.com/ Cloudera Hadoop distribution: http ... Hadoop 2.x and its associated tools promise to deliver big data solutions not just to the IT-heavy big players, but to anyone with unstructured data and the need for multidimensional data analysis.
13%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
. Encryption by means of a certificate or multifactor access control (e.g., FIDO2 in addition to the password) is more useful, preventing data leaks even if the stick and the password fall into the hands ... The systemd Homed service makes it easy to move your home directory, and FIDO2 or PKCS#11 can secure the stored files.
12%
New features in PHP 7.3
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © MIR, Fotolia.com
assign variables by reference in list(). The three-liner $array = ["Hans", "Hansen"]; $firstname = $array[0]; $lastname =& $array[1]; can be written succinctly in PHP 7.3 as: $array = [1, 2]; list ... The new PHP 7.3 simplifies string handling, supports PCRE version 2, adds LDAP controls, improves logging, and deprecates some features, functions, and syntax elements.
12%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
6-only nodes do not need to know about it. A typical example of router-to-router tunnel is a 6to4 tunnel. In many cases, the tunnel connects two corresponding routers over the IPv4 Internet, in order ... Now that IPv6 is the official Internet protocol, all that remains is the simple task of migrating all the machines on the Internet. Until that happens, tunnel technologies provide an interim solution.
12%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
, such as Internet traffic, are routed via external gateways on routes learned from BGP. Three components are thus necessary for an IP fabric: (1) an external gateway to communicate with the outside world, (2 ... Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly
12%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
://bugs.launchpad.net/ubuntu/+source/btrfs-tools/+bug/968403 btrfs-tools package in Debian Sid: http://packages.debian.org/sid/Btrfs-tools SLES 11 SP2 release notes http://www.suse.com/releasenotes/x86_64/SUSE-SLES/11-SP2/ Snapper portal: http ... SUSE has officially supported Btrfs in Service Pack 2 of its Enterprise Server 11 since February 2012. Oracle followed soon after with Btrfs support in its own Linux. We explore the possibilities
12%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
). If router A in AS 64496 with an IP address of 192.0.2.1 wants to peer with router B in AS 64500 and IP address 192.0.2.2, router A must store the neighbor 192.0.2.2 with AS 64500 and router B the peer 192.0.2 ... We look at the Border Gateway Protocol, how it routes packets through the Internet, its weaknesses, and some hardening strategies.
12%
News for Admins
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
© Elnur Amiskishiyev, 123RF.com
stories continue to evolve, these companies will be on their toes to keep up with new discoveries. Docker EE 2.0 Announced Docker Inc. has announced the release of Docker Enterprise Edition (EE) 2.0 ... Meltdown and Spectre revisit Intel, AMD, and ARM processors, Orangeworm, a new hacking group, targets the healthcare industry, Docker EE 2.0 announced, Remote code execution vulnerability found
12%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
-SelfSignedCertificate cmdlet. To create a self-signed certificate for a web page (Figure 5), type: New-SelfSignedCertificate -CertStoreLocation '' -DnsName '<s2.joos.int>' The certificate ... If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager
12%
Effective honeypots with sensors on production systems
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© monophoto, 123RF.com
systems. If a malicious program interrupts the attack after the first successful infection attempt on a simulated service, the genuinely vulnerable services might not be attacked. In this case, an infection

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice