Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 171 Next »

13%
Response automation with Shuffle
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Kenneth Berrios Alvarez on Unsplash
). Shuffle fetches the input from your monitoring tools (e.g., an intrusion detection system) and passes this input on to any number of other tools for further action, such as to your network management tool
13%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
encryption. The Detect category offers techniques that can be used to detect malicious activities or to evaluate general activities on your network. Staying with the phishing example, clicking on Sender MTA
13%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
with the use of the built-in validation logic. The choices that Desktop Authority offers administrators creating profiles are versatile and leave little to be desired, whether you need to assign network
13%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
This issue features a free DVD with NodeZero Linux, a "pentest" distro containing more than 300 tools for network penetration testing. NodeZero's Live boot option lets you boot from the DVD without
13%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
to the Internet safely without anything but some Access Control Lists (ACLs) combined with an eye for minimalism. I’m referring to keeping the number of packages (and more specifically network services
13%
TheSSS: World's Smallest Server Suite
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © zhao lizu, 123RF.com
The temporary workgroup you have set up wants to save its files on a dedicated FTP server; you want to try out a proxy to see if you can reduce the network load and set up a web server
13%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
to prepare carefully and professionally for an upgrade. Neutron The Open vSwitch driver in OpenStack's Neutron networking component was tagged as deprecated in Icehouse. Juno no longer contains the driver
13%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
or a direct stream of network data, for example, serve as output data. In the case of anomalies, the system executes actions according to the specifications defined in playbooks (e.g., informing a cybersecurity
13%
Acquiring a Memory Image
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise, 123RF.com
Protecting your network environment with the latest virus protection, controlling what software is installed and allowed to run, restricting network access, protecting web browsing, limiting user
13%
Integrate remote cloud storage
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © rawintanpin, 123RF.com
Often, users fail to back up their data regularly and synchronize backups. Of course, any data you store locally should also be stored on a remote mass storage device. If the local server or network

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice