Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 108 Next »

12%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
, because it distributes the attack over several systems, making the connection somewhat more difficult for security information event monitor (SIEM) and intrusion detection tools to discover. To listen
12%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
to access the processed data. SQL Server 2016 also monitors and optimizes queries via the Query Store and can store them for later use. SQL Server 2016 is optimized for use with Windows Server 2016 and its
12%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
is on a section of road at any given time. Energy suppliers are involved in performance tuning by electronically monitoring the power consumption behavior of households and industrial enterprises (smart metering
12%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
for publication on the internet. Different subsections and wizards help you with the setup. You can also monitor internal applications and database operations using the web interface. This is available
12%
OpenStack: What's new in Grizzly?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Oksana Perkins, Fotolia
be used as a data source for an industrial billing system and as a source for cloud monitoring. One client (or in Ceilometer-speak, "consumer") is BillingStack, which is a separate billing system for Open
12%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
redundant Ethernet switches, LAN separation, firewalls, intrusion detection, and monitoring. Redundant firewalls are located between the Internet and the AirWatch environment. An intrusion detection system
12%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
: Multi-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto
12%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
for the first time, it downloads the available block and reputation lists to the local system, which you can monitor easily in a terminal window. After launching the server, you can access Maltrail in the web
12%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
-based access monitoring on the switch. Now, you need to specify for each switch port you will be using that it is an access port with 802.1X port monitoring – as you can see for the Fastethernet0/1 port
12%
Managing VHD devices
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Roman Smitko, 123RF
conversion tools are available, administrators still depend on a virtual machine monitor and are thus forced to opt for one format. Setting Up VHD Disks You can easily create and mount a VHD file using

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice