Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (272)
  • Article (10)
  • News (10)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 30 Next »

20%
Denial of service defense
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Russell Shively, 123RF.com
-based attacks Flood the network with traffic to overload the bandwidth. Network bandwidth DDoS UDP/ICMP flooding Send a large number of UDP/ICMP packets to overload the target
20%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
they can then store on network attached storage. When needed, the server image can be loaded on replacement hardware (available on short notice by means of a hardware-independent restore [HIR] process
20%
Search for domain controller vulnerabilities
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © varijanta, 123RF.com
Admins prefer to discover vulnerabilities on their networks before attackers do, so it makes sense for those who look after these networks and AD to familiarize themselves with common tools
19%
Citrix Provisioning Services reviewed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© henrischmit, 123RF
a vDisk. vDisks can reside on a provisioning server, file server, or storage network (iSCSI, SAN, NAS, CIFS). Computers that receive and use the image are target devices in streaming services
19%
Windows client management with the new Opsi 4.0.1
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
if the connection were interrupted. Apart from this, a traveling worker's laptop would be unable to reach its Opsi server for lack of a network connection. In other words, a totally different solution was needed
19%
This Issue's CD
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
, or even over the network. Among other things, TRK Linux lets you reset Windows passwords, recover dying hard disks, clone computers over a network, clean up Windows junk files, read and write to NTFS
19%
The NDMP protocol and alternatives for filer backup
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Suwit Luangpipatsorn, 123RF.com
an agent, but this approach has its downside. For example, all the data in the backup needs to cross the network wire to the backup server, and if you don't have a dedicated connection, impairments
19%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
 
, and non-profit organizations. According to the company, ClearOS Professional 6 is an affordable and powerful network, gateway, and server OS providing critical security and management tools – including
19%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
(SIEM), and mobile device management (MDM); you use network address translation (NAT), require a virtual private network (VPN) for remote connectivity, keep all your systems updated, keep an application
19%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
A Domain Name System (DNS) name resolution configuration that is not carefully considered or simply incorrect will tend to cause a variety of problems on a network. Unstable server-based services

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice