Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 148 Next »

14%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
the synchronization problem with Network File System (NFS), Server Message Block (SMB), Distributed Replicated Block Device (DRBD), and other components to "share" file- and block-level resources and perform block
14%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
. Without DNS you would have to know IP addresses by heart and enter them directly in your web browser's address bar. The DNS data packets pass through the network without encryption or signatures. Only a 16
14%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
IPv6 does away with NAT, which functions much like a firewall for internal networks with IPv4, even though it was not designed for that purpose. With IPv6, a dedicated firewall now needs to provide
14%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
the replacement of faulty nodes. A DHCP server was also configured to assign new network addresses and reclaim the addresses that are no longer used. An in-depth tutorial of the technologies used in the examples
14%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
by repeating the podman ps command. Listing 2 Running Nginx Container $ podman run -dit nginx ERRO[0000] could not find slirp4netns, the network namespace won't be configured: exec: "slirp4netns
14%
If You Don't Like Security Guys, Call a Hacker
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
who have true knowledge of how to compromise systems, to expose data, and to maintain a stealth presence inside your network. I know that a few companies have hired hackers that have infiltrated
14%
My Five Favorite Sys Admin Tools
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Roywylam and Hans Slegers, 123RF.com
, and work with a host's virtual machines. Pulseway is an extremely inexpensive but powerful tool that I'll never work without. Wireshark: If you need to scoop up network traffic for analysis, you'd better
14%
OpenStack: Shooting star in the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Vladimir Nenov, 123RF.com
Stack world defines the following automation tasks: User management Image Management Network management VM management Block storage management for VMs Cloud storage The front end
14%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
, Microsoft Remote Desktop Protocol (RDP), Apple Remote Desktop (ARD), and Virtual Network Computing (VNC) have all proven their value as protocols for accessing the graphical user interface (GUI) of remote
14%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
Routing Encapsulation (GRE) protocol tunnels and virtual private networks (VPNs). In 2018 Cloudflare introduced the Argo Tunnel as a solution to alleviate this problem. Individuals can create a secure

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice