Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (264)
  • News (12)
  • Article (10)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 29 Next »

20%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
Centralized storage in the form of network-attached storage (NAS) or a storage area network (SAN) are implicitly or explicitly set in stone in the data center. Wherever you look, you will likely
20%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
The most common operating systems on the LAN are Windows, Linux, and Mac OS X. They all run IPv6 in parallel with IPv4. IPv6 is enabled and active by default, and the systems on the network communicate via
20%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
Complex, redundant networks, such as the Internet, require different routing policies from those typically found on a LAN. Ideally, the routers will know all the paths that lead to the target
20%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
management (MDM). Once we've chosen a management suite, our battle is only half over. Most MDM suites provide consistent controls over devices that enter our network perimeters, both physically and virtually
20%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
security agencies have warned that Chinese state hackers (https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/) "have compromised networks of major
20%
Tails 7.0 Announced
10.10.2025
Home »  News  » 
 
The Tails team has released version 7.0 of Tails, a portable Linux-based operating system that “uses the Tor network to protect your privacy online and help you avoid censorship.” This release
20%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-based attacks Flood the network with traffic to overload the bandwidth. Network bandwidth DDoS UDP/ICMP flooding Send a large number of UDP/ICMP packets to overload the target
20%
Open Compute Project and SNIA Form Alliance to Tackle Data Storage Challenges
16.10.2025
Home »  News  » 
 
-neutral standards and technologies for data storage within open data center hardware ecosystems.” According to the organizations, the alliance is especially focused on data storage, memory, and networking challenges
20%
Ingress NGINX To Be Retired
22.11.2025
Home »  News  » 
 
The Kubernetes SIG Network and the Security Response Committee has announced the upcoming retirement of the Ingress NGINX Kubernetes controller. “Best-effort maintenance will continue until March
20%
System Tools for Recovering Broken PCs
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
, editors, and filesystem drivers. SystemRescueCd is an all-in-one toolbox you can use to diagnose network problems, check memory, restore system files, undelete partitions, and back up data from failing

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 29 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice