Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • News (233)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 174 Next »

13%
Our Technological Enlightenment
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© lightwise, 123RF.com
, and computer networks were becoming commonplace in businesses. Still, we were in the dark and were disconnected. The mid-1990s saw a boom in the number of computer users with the new, publicly accessible
13%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
A penetration tester simulates an attack on a customer’s network by trying to find a way inside. Many such attacks begin using a scanning tool, such as NeXpose, Nessus, or Nmap, to look for network
13%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
is therefore the means of choice. Turbo II – NVMeOF NVMe over Fabrics (NVMeOF) is another new protocol for speedier server-to-memory connections. NVMeOF is an extension of the NVMe network protocol to Ethernet
13%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
to control the AWS Console. If you set up the virtual networks in the public cloud with private addresses only, they are just as invisible from the Internet as the servers in your own data center. Cloudbnb
13%
Security with PowerShell 5
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Fernando Gregory Milan, 123RF.com
and work their way up the network (Figure 1). Fortunately, administrators are not completely defenseless, because PowerShell 5 offers some useful security features that both limit the use of the scripting
13%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
ESXi server or a tethered network-attached server can serve as the backup target. Virtual machines (VMs) can also be scheduled for replication on a different host using XSIBackup. The software sends
13%
Monitoring server hardware with the Nagios IPMI plugin
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Vladimir Nenov, 123RF.com
others, IPMI is typically standard equipment [1]. The heart of the IPMI specification is the Baseboard Management Controller (BMC), which uses the network or a local system bus to talk to userspace
13%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
Most admins are well aware of IPsec, the powerful protocol used to encrypt network traffic over TCP/IP networks. IPsec is often used with VPN connections to join remote LANs through a private tunnel
13%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
A penetration tester simulates an attack on a customer's network by trying to find a way inside. Many such attacks begin with the use of a scanning tool, such as Nexpose, Nessus, or Nmap, to look
13%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
a git push over SSH. Not all Linux statuses can be queried with the Goss onboard tools. For example, the tool detects whether the MariaDB process is running and listening on a specific network port

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice