Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 96 Next »

12%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
table attacks. This technique significantly improves the security of hashed data and should be used by default. Implement continuous monitoring and evaluation processes to ensure the effectiveness
12%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
. The current version, 1.2.1, was released in August 2025. Actium (including the man page) is available from the manufacturer (mailto:info@gnupg.com). GnuPG actium (Figure 1) monitors the LDAP directory service
12%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
selected areas – not everything below the root (/) directory. Both services use the same configuration file, /etc/clamd.d/scan.conf. The following settings tell ClamAV to monitor the users' home directories
12%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
, but it already enjoys huge popularity because EDA allows the systems of an Ansible inventory to be monitored specifically for individual events. You define the rules (Figure 2), and if a specific event occurs
12%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
, as long as it has the minimum number of disks. If a disk fails, the RAID subsystem automatically removes it from the array. However, you need to monitor the RAID with a monitoring tool like Nagios to detect
12%
openlava – Hot Resource Manager
10.10.2012
Home »  HPC  »  Articles  » 
an architecture document, here is a quick overview: LIM: The openlava Load Information Manager monitors the machine’s load and sends the information to the LIM on the cluster master. RES: The openlava
12%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
confidential information through analysis of the error messages. Additionally, administrators should log the error conditions and monitor the total number of error messages. If the number of errors increases
12%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
claims to “handle approximately 160,000 distinct metrics per minute running on two niagra-2 Sun servers on a very fast SAN” [1]. Graphite is thus best used in environments that need to monitor thousands
12%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
the TEM agent is installed. The agent requires two-way network communications with the TEM server. The upside to TEM is its ability to manage and monitor thousands of endpoints. TEM’s downside is its
12%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
captures packets in libpcap format, it adds a timestamp entry to the record in each packet in the capture file. Monitoring software like tcpdump uses libpcap to capture packets traveling over a network, read

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice