Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 171 Next »

13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network
13%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
is therefore the means of choice. Turbo II – NVMeOF NVMe over Fabrics (NVMeOF) is another new protocol for speedier server-to-memory connections. NVMeOF is an extension of the NVMe network protocol to Ethernet
13%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
to control the AWS Console. If you set up the virtual networks in the public cloud with private addresses only, they are just as invisible from the Internet as the servers in your own data center. Cloudbnb
13%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
and work their way up the network (Figure 1). Fortunately, administrators are not completely defenseless, because PowerShell 5 offers some useful security features that both limit the use of the scripting
13%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
ESXi server or a tethered network-attached server can serve as the backup target. Virtual machines (VMs) can also be scheduled for replication on a different host using XSIBackup. The software sends
13%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
a git push over SSH. Not all Linux statuses can be queried with the Goss onboard tools. For example, the tool detects whether the MariaDB process is running and listening on a specific network port
13%
Monitoring server hardware with the Nagios IPMI plugin
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Vladimir Nenov, 123RF.com
others, IPMI is typically standard equipment [1]. The heart of the IPMI specification is the Baseboard Management Controller (BMC), which uses the network or a local system bus to talk to userspace
13%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
Most admins are well aware of IPsec, the powerful protocol used to encrypt network traffic over TCP/IP networks. IPsec is often used with VPN connections to join remote LANs through a private tunnel
13%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
A penetration tester simulates an attack on a customer's network by trying to find a way inside. Many such attacks begin with the use of a scanning tool, such as Nexpose, Nessus, or Nmap, to look
13%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
The Internet comprises a mix of autonomous systems (ASs) – networks and systems each under the administrative control of a specific provider – that have officially registered numbers known

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice