Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1247)
  • News (231)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 171 Next »

54%
Network monitoring with Zeek
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Susann Schuster on Unsplash
If you want to know what is happening on your network, the only way is to look at the connections between devices and to endpoints on the Internet. Popular tools such as tcpdump and Wireshark ... Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization. ... Network monitoring with Zeek
54%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
, which is based on classic 802.1Q VLAN technology, is interrupted by a routed link in Layer 3, the required transparency is lost. A virtual extensible local area network (VXLAN) solves this problem ... VXLAN addresses the need for overlay networks within virtualized data centers accommodating multiple tenants. ... Network overlay with VXLAN
54%
Open Network Operating System
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Rade Lukovic, Fotolia.com
The Open Network Operating System (ONOS) [1] is a software-defined networking (SDN) platform that aims to open up proprietary, inflexible, and expensive network black boxes. A few high ... ONOS is an open source software-defined networking project that is developing into a serious competitor. ... Open Network Operating System
54%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
The Advanced Maryland Automatic Network Disk Archiver, also known as Amanda, backs up a computer across the network to a central backup server. The backups migrate to hard drives, network storage ... The free Amanda backup utility dates back to the days of tape drives, but it is still a powerful tool for centralized backup across the network. ... Network backups with Amanda
54%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
. The number of tools at your disposal quickly multiplies if you manage a network with various operating systems, and, while having access to several utilities sounds like a good thing, juggling them ... Osquery is a cross-platform open source tool that you can use to query your network, just like a database. ... Keep an eye on your network
54%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
Administrators monitor key network connections to detect issues (e.g., congestion) at an early stage. The Simple Network Management Protocol (SNMP) is often used for this purpose to query ... OpenNMS collects and visualizes flows so you can discover which network devices communicate with each other and the volume of data transferred. ... Improved visibility on the network
54%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
, intelligent network platform. The benefits offered by this kind of integration are huge: Besides significant efficiency boosts attributable to the automation of building services, the technology also improves ... The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail ... Purdue Model for industrial networking
54%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
The corporate network has long ceased to be a single perimeter with branch offices connected to the outside world by the Internet. In the growing network jungle, however, an overall perspective ... A holistic approach to designing network architecture and cybersecurity uses DNS for cyber defense to detect attacks at an early stage and fend them off before major damage takes place. ... Employing DNS in network security
54%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
Linux comes with a whole bunch of useful network analysis tools, many of which provide excellent results that can easily compete with commercial tools. Despite this, Windows administrators ... An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can ... Network analysis with Wireshark
54%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
One of the most demanding tasks for network administrators is securing the LAN against attacks. In this context, admins must remember that infrastructure and data are threatened not only by external ... Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security ... Security in the network with Kali Linux

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice