Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 148 Next »

13%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
firewalls, poorly protected network devices, and so on. At the same time, IT setups are becoming increasingly complex, comprising increasing numbers of components. What's more, sometimes you do not know
13%
Samba domain controller in a heterogeneous environment
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Zachary Nelson on Unsplash
An Active Directory (AD) domain controller (DC) serves as a central logon server in heterogeneous networks with Windows, Linux, and macOS clients. This task does not necessarily have to be handled
13%
Develop your own scripts for Nmap
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Raman Maisei, 123RF.com
for developing test scripts. Nmap executes these scripts in parallel at a high speed and with great efficiency. Nmap's core functions are network, version, and vulnerability analysis. NSE takes scanning with Nmap
13%
OpenShift by Red Hat continues to evolve
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © ktsdesign, 123RF.com
basis as a virtualization solution and as cloud software is the integration of external appliances into the cloud, such as firewalls or classic load balancers from Palo Alto Networks or F5 Networks [8
13%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
use in a real-world vertical farming operation. Although building and training deep neural networks requires powerful servers provided with graphics processing units (GPUs) or tensor processing units
13%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
. They promise container application developers a central network interface in which the parts of an application talk. The required services (i.e., load balancing, filtering, discovery of existing services, etc
13%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
by the cluster controller to form a cluster. The cluster controller determines which virtual machine starts on which node; it manages the network to which virtual machines connect. Cloud Controller (CLC
13%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
attacks on filesystems and directories, changes to system files and configuration files, failed login attempts, and attempts to escalate privileges. The tool also detects changes to logfiles and network
13%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
the control plane to the usual three-node setup. Further cost-saving measures can be identified in the storage, network, and proxy realms. K3s relies on the Traefik reverse proxy for IP routing instead
13%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
, isolated access to your filesystems, and monitored network traffic. In the container context, these functions include Nspawnd and Portabled. When deployed correctly, they draw on features from

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice