Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 108 Next »

12%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-ed25519 ssh-mitm The ssh-mitm [4] program supports security monitoring and lets you monitor your own SSH traffic. The developers want to highlight
12%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
. Something's Not Right The last thing to consider is security monitoring. Even in conventional network settings, it is a challenge for admins to detect something going wrong. The problem is significantly
12%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
Runtime Security Instrumentation (KRSI). The framework monitors complete data streams and sets up checkpoints at neuralgic points to enable applications to interrupt traffic flows. KRSI does
12%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
of GPOs, in the test. Monitoring Replication Replication, and therefore the distribution of changes in Active Directory, is one of the directory service's most important functions and is especially true
12%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
be displayed. Speaking of metrics data, integrating HAProxy into conventional and state-of-the-art monitoring systems is very simple thanks to previous work by many users and developers. The tool comes with its
12%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
Schedules CPU access to cgroups. perf_event Monitors threads of a task group on a CPU. Table 3 Relevant CGroup Parameters Parameter Function cpuset
12%
High availability with Oracle Standard Edition
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © aquir, 123RF.com
, of course, not with the monitoring and management capabilities that Data Guard offers. Standard Edition and High Availability Is high availability then possible only using the Enterprise Edition? A look
12%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
is the ability to set up monitoring for virtual servers in the cluster. You can find this setting in More Actions  | Configure Monitoring . Then, select the services to be monitored by the cluster. If one
12%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
information [1]. Centralized Network Management In the field of network security, the network controller plays an important role. The server service supports central control and monitoring of physical network
12%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
of Hyper-V (usually in the form of a Hyper-V failover cluster with multiple nodes) and a scale-out file server, the entire environment can be monitored and controlled. By default, the system ensures that

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice