Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1018)
  • News (227)
  • Article (222)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 147 Next »

56%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
, intelligent network platform. The benefits offered by this kind of integration are huge: Besides significant efficiency boosts attributable to the automation of building services, the technology also improves ... The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail ... Purdue Model for industrial networking
56%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
The corporate network has long ceased to be a single perimeter with branch offices connected to the outside world by the Internet. In the growing network jungle, however, an overall perspective ... A holistic approach to designing network architecture and cybersecurity uses DNS for cyber defense to detect attacks at an early stage and fend them off before major damage takes place. ... Employing DNS in network security
56%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
One of the most demanding tasks for network administrators is securing the LAN against attacks. In this context, admins must remember that infrastructure and data are threatened not only by external ... Thanks to its huge choice of security tools, Linux is perfectly suited to securing heterogeneous networks. With a specialized distro like Kali Linux, you can quickly locate and eliminate security ... Security in the network with Kali Linux
56%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
Virtual local area network (VLAN) tagging on an IEEE 802.3 network is defined by the 802.1Q standard, which makes it possible to separate traffic from different logical networks within a physical ... LAN data transmission has evolved from the original IEEE 802.3 standard to virtual extensible LAN (VXLAN) technology and finally to today's Generic Network Virtualization Encapsulation (GENEVE ... GENEVE network tunneling protocol
56%
Turbocharge your network with Zeroshell
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Przemyslaw Koch, 123RF.com
Zeroshell is a Linux distribution that will help you roll out useful network-related services. If you are responsible for a group of networked computers on a small local area network (LAN), you can ... Turbocharge your network with Zeroshell
56%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
cannot work with the system. Cheaper by the Dozen: CAL Suites If you use Windows Server 2012 R2 with Exchange Server 2013 on the network, you need to purchase a CAL for Windows and a CAL ... User licensing in Microsoft networks
56%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
LibreNMS [1] promises flexible network and system monitoring and combines various functions from tools such as Nagios and Cacti. Another advantage of the software is that, unlike its predecessor ... Versatile network and system monitoring
55%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
In 2005, after an inordinate struggle to set up his own home networked file storage, Olivier Cochard-Labbé decided to create a solution to streamline the process. Much coding and configuring ensued ... Build a Network Attached Storage System with FreeNAS
54%
Happy SysAdmin Appreciation Day!
28.07.2023
Home »  News  » 
To celebrate System Administration Appreciation Day and to honor the tireless work of IT professionals, ADMIN Network & Security and TuxCare are pleased to offer the 2023 edition of 10 Terrific ... Security, system administration, SSH, tools, network, SysAdmin Day
52%
Cumulus Networks Enhances Their Network-Specific Linux
02.12.2019
Home »  News  » 
 
Cumulus Linux is a full-featured Linux operating system designed specifically for the networking industry. Cumulus supports a wide array of networking hardware and is fully compliant with the Open ... Cumulus Networks Enhances Their Network-Specific Linux

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice