Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (91)
  • Article (17)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

10%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... released Ceph 0.56, code-named “Bobtail,” in January 2013, promising the user vastly improved performance. In terms of the configuration file, there are some CephX-related changes: whereas in Ceph 0.47 you ... We look at the new features in Ceph version 0.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic
10%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
protocols for individual or all users (network application control). Therefore, you can block bandwidth-intensive applications such as Torrent and prevent data being uploaded to cloud applications
10%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
your auto-healing servers once you throw the open source and dirt cheap M/Monit into the picture. Infos Monit: https://mmonit.com/monit/ Code for this article: https://linuxnewmedia.thegood.cloud
10%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
://cassandra.apache.org Apache TinkerPop: http://tinkerpop.apache.org RDF: https://www.w3.org/RDF Gremlin Console: https://github.com/tinkerpop/gremlin/wiki/Downloads Neo4j sandbox: https://www.neo4j.com/sandbox Nomen
10%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
of latency. Edge and fog computing demand a faster response. TLS 1.3 delivers with 0-RTT session resumption. This quick procedure is at least as thrilling as the original no-frills handshake, if not more so
10%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
: https://docs.docker.com/scout/ Clair: https://github.com/quay/clair mysqldump: https://dev.mysql.com/doc/refman/8.0/en/mysqldump.html Selenium: https://www.selenium.dev/ Postman: https://www.postman.com
10%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
that describe the ideal state of systems and let you check that the state is maintained are helpful, although they do not detect vulnerabilities in applications, such as coding errors. Precisely these errors can
10%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
compromise system security. However, are current cybersecurity best practices enough? In short, the answer is "no." History teaches that exploitable vulnerabilities always surface, and even the most
10%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
Community Edition, Commercial Version Open Source Edition, Enterprise Edition Open Source Edition SaaS model Via partners, Hosting Edition Cloud Edition No
10%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
.168.2.2" }, { "name": "domain-search", "data": "mydomain.example.com, example.com" }], "subnet4": [{ "subnet": "192.168.2.0/24", "pools": [{"pool":"192.168.2.1 - 192.168.2.50"}], "option-data": [{ "name

« Previous 1 ... 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice