Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 149 Next »

13%
Proxmox virtualization manager
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image by Daniela Cuevas on Unsplash.com
approaches on the network side: Basically, the network concept of the solution is based on network bridges, but you can also integrate software-defined networking (SDN) solutions such as Open vSwitch. IPv4
13%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
in this example. VirtualBox networking can be quite challenging, so getting this setup to work will give you the confidence that a cloud or data center deployment will work without major issues. You might wonder
13%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
-made components from the network for the roles, be sure to back up the Ansible Playbooks and the configuration files of the individual services, because these are specific to the respective installation. It goes
13%
Red Hat Enterprise Linux 8 pre-series test
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image Photo by Filip Mroz on Unsplash
calls to scripts and programs entail. Network News If you are running a RHEL-based firewall, you have to be prepared for several changes, the biggest of which relates to the packet filter. Officially
13%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation." In this article, I look at BackBox Linux and what is necessary
13%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
, is too tempting from the perspective of many corporations. On request, Kubernetes will give you persistent storage along with dynamic IP addresses in the context of a software-defined networking (SDN
13%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
with the chaotic flood of data used by legacy DDoS attacks in previous years (also see the "What Is DDoS?" box). According to a survey by Arbor Networks, typical bitrates in DDoS attacks last year were around 1
13%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
is distributed across the Microsoft Developer Network (MSDN) and the official documentation is incomplete. The collection of links [1] can be useful because it points you to relevant documents and tutorials
13%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
to workflows and processes involving administrative intervention that is not always convenient. Entry Ransomware has a limited number of vectors for entering the company network. Email and malicious
13%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Oksana Bratanova, 123RF.com
-licensed software lets you deliver Linux and Windows applications or complete desktops from a server over the local network and render them in a Java-enabled browser. From a technology standpoint, OVD is more

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice