Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 147 Next »

60%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
in Hyper-V. In Windows Server 2016, you can add and remove network adapters on the fly (Figure 1). You do not need to shut down VMs to shut down an adapter. This feature is particularly useful if you work ... Hyper-V Virtual Networks ... Virtual networks with Hyper-V in Windows Server 2016 ... Network in a Box
60%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
Kubernetes is not necessarily the brightest star for people who operate networks, because it does not cover more complex network scenarios, such as those found in ISPs, telecommunications companies ... In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what ... Network Service Mesh ... Network Lego
59%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
protocol for hardening network protocols. The best known application is probably secure email communication with Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and a combination of the two ... The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular ... Hardening Network Protocols ... Hardening network services with DNS
59%
NetworkManager at the command line
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © godrick, 123RF.com
NetworkManager should be familiar to most readers, because many of today's Linux distributions use it to configure the network. One reason for changing from legacy init scripts to a system ... A variety of approaches are available for customizing the network on modern Linux systems. Here, we focus on the NetworkManager tool. ... NetworkManager ... NetworkManager at the command line
59%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
Networks can be virtualized, just like servers, storage, or entire data centers. The technology is based on developments at Stanford University, and today, the Open Networking Foundation ... The history, technical underpinnings, and possible future standards of software-defined networking for 5G, IoT, and edge computing. ... Software-Defined Networking ... Software-defined networking for the future
59%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
, a beer brewing sensor, and even a home media center. In this article, I will show you how to apply a Raspberry Pi and the network monitoring software Icinga to monitor your networks. Many people have ... Icinga on the Raspberry Pi monitors your network, letting you see the good, the bad, and the ugly, so you can address problems proactively. ... Rasp Pi Network Monitoring ... Network monitoring with Icinga and Raspberry Pi
59%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
bulldozers digging up cables, Layer 2 or 3 software failures, or routers that fail one hop downstream on the provider's network. To avoid hard disk failures, administrators have relied on RAID for a long time ... RAID for the Network
59%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
. Imagine a distributed application with multiple tiers distributed across multiple data centers for resilience. Because Azure networks can be connected across data center boundaries and regions, as well ... Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel ... Azure Network Security Groups ... Protect Azure resources with Network Security Groups
59%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
Communications networks play an important role in digital transformation. With the rapidly increasing number of intelligent machines and industrial plants and of networked processes and systems ... 5G Campus Networks ... Private 5G networks for industry and business
59%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
The Bro Network Security Monitor (Bro) is a network-based analysis framework. Bro's powerful analysis engine makes it adept at high-performance network monitoring, protocol analysis, and real ... The Bro network analysis framework provides network security monitoring as well as more general network traffic analysis. ... Network analysis with the Bro Network Security Monitor

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice