Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 133 Next »

16%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
] is for some reason waiting for recent I/O to be written to disk before completing. This observation seemed to point the finger at some unexpected queuing of operations at the filesystem level, as if some part
16%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
Successful web applications grow organically and eventually reach the point where a speed bottleneck occurs in the system. Websites that are too slow usually have high bounce rates. Sometimes
16%
Scanning servers with Nikto
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © spleen87, photocase.com
see some Apache error log entries, too. A number of security findings by Nikto that an owner wouldn't want you to know about will be highlighted, as well, so don't just point the comprehensive tool
16%
Working with the Exchange Management Shell
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © silvae, 123RF.com
not only for Exchange administrators but also for managing SharePoint or Internet Information Services (IIS). Those who steer clear of the console do not have the options for performing all administrative
16%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
processes. This way you will receive more interesting information about the protection possibilities for individual applications. At this point you can add additional applications, either by specifying
16%
Advantages of data analysis with graph databases
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © alphaspirit, 123rf.com
), the size of the data pool to be searched increases exponentially, and from a computational point of view, this approach is simply too expensive for other database architectures. For data connections
16%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
system (osquery supports Linux, Windows, and Mac OS X). Figure 1 showcases the raw power of osquery with an example of what could be a starting point in the search for a rogue process; a simple query
16%
Call web pages in the terminal with Browsh
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © yemelyanov, 123RF.com
/browsh/config.toml. If necessary, you can use a text editor to adjust the settings. Adding startup-url= points to the URL that the program calls by default. If you type only one keyword in the address bar, Browsh appends
16%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
-query --port 5053" points to the DoH endpoints offered by Cloudflare and specifies that the proxy will run on port 5053. If you prefer to use a different DoH server, enter one of the other public DoH servers
16%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
at one point in the best case. The actual highlight is yet to come: SDN introduces an abstraction that makes the network easier to understand. In the past, IT departments had to break down a business

« Previous 1 ... 79 80 81 82 83 84 85 86 87 88 89 90 91 92 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice