Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 99 Next »

15%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
, which uses the gossip protocol to manage membership and broadcast messages to the cluster. Requests are relatively fast, because the data is not replicated across data centers. When a request for a remote
15%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
usually comes into play because different rules apply to external, as opposed to internal, connections. VMs must then be operated twice, depending on the target. Special Hardware for Remote Access Finally
15%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
, it can be installed automatically and remotely at the push of a button. As part of this process, the machine is also equipped with the appropriate software; a short time later, it is up and ready
15%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
functionality; it is not intended for production use. Listing 3 BGP Config Snippets 01 #FRR1 02 router bgp 65540 03 neighbor LAB peer-group 04 neighbor LAB remote-as 65541 05 neighbor LAB
15%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
the processor and significantly shortens queues and processes. This approach, in turn, increases the speed of the operating system and the various services such as Hyper-V. Remote Direct Memory Access (RDMA
15%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
login data for remote maintenance access. The perpetrators then use the data to access corporate networks, which in turn means they have found another victim for their malware. Protections Different
15%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
with a keyboard and monitor, which is an option if the corresponding device can be controlled remotely over the Intelligent Platform Management Interface (IPMI), Dell Remote Access Controller (DRAC), Integrated
15%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
are part of successful attack vectors. Although many companies restrict remote access through firewalls, VPN, and special access rights to the local network, the same is not true for physical access
15%
Storage protocols for block, file, and object storage
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo Johannes Plenio on Unsplash
cards or special host bus adapters, either with iSCSI extensions for remote direct memory access (iSER) or with the help of a TCP offload engine that has implemented not only the IP protocol but also
15%
Web-based reconnaissance
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Wayne Daniels, 123RF.com
conduct remote physical security analysis to identify YouTube videos, Twitter tweets, and Flickr photos in a defined geographical area. Acquiring API keys are a requirement of this endeavor. For more

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice