Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (100)
  • News (1)
Keywords

1 2 3 4 5 6 7 ... 11 Next »

100%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker ... The sshguard tool does more than just repel attacks; it monitors login attempts and blocks future access. ... 3
87%
Securing AI model deployments with SELinux
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Kirsty Pargeter, 123RF.com
prevents unauthorized access to sensitive model files (Figure 3) and effectively prevents unauthorized data exfiltration. Figure 3: SELinux prevents ... We assess the effectiveness of SELinux in protecting AI model deployments on RHEL 9, demonstrating its ability to block unauthorized access, modification, and resource exploitation through mandatory ... Blocked
84%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
to corrupted data. If you now copy the cluster.conf file to another cluster node and then launch the cluster manager by typing /etc/init.d/cman start, you should see output similar to Listing 4 when you query ... 3
74%
The next generation of Internet connectivity
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
ktsdesign, 123RF.com
's with all the colons? Well, put simply, IPv4 addresses are short, so writing out the entire address is easy. With IPv6, however, you get something like 1.2.3.4.5.6.7.8.9.234.25.198.221.82.15.16. To make ... 3
47%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.com [3] for a video that might help you set up your environment ... AppLocker lets administrators of Windows Server 2008 R2 and Windows 7 use policies to block individual applications. This prevents users from smuggling in undesirable programs on USB sticks ... Using AppLocker to block applications on networks
36%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
your attention: In the Bacula system, each task is handled by a separate program. Tasks can include reading the data to be backed up and transferring them across the network, writing to the backup media ... Free backup tool for data centers
36%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
available in the /var/lib/oprofile/samples directory. For a general overview, you can access the data with opreport – either the data for the complete system or the data for a specific application (Listing 3 ... Does your application data take ages to creep off your disk or your network card, even if no noticeable activity is taking place? Tools such as OProfile and SystemTap help you find out why. ... Data on Tap
32%
DBaaS – How they make data scale
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Rungaroon TAWEEAPIRADEEMUNKONG, 123RF.com
, instead of finding out how to install it, I thought I'd learn how these guys solve the problem that matters most in the cloud: keeping something running all the time and at scale. What's That? Cloud means ... DBaaS – How they make data scale
29%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kheng Ho Toh, 123RF.com
-Component Glue The new oVirt version 3.1 [3] is available on the oVirt project homepage. The package contains the JBoss application server 7.0 as the foundation for the oVirt engine, the KVM hypervisor, an SDK ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt 3.1 ... Managing virtual infrastructures with oVirt 3.1
18%
News for Admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
 
Protection for Virtualization Certification (https://www.suse.com/c/suse-certified-data-protection-for-virtualization/), which "validates third-party backup, restore, and disaster recovery solutions against ... Releases 1.0 Specification; CVE Foundation Issues Call for Support; Doudna Supercomputer in Development at NERSC; AlmaLinux OS 10 Released; CloudBees Introduces Unify DevOps Solution; Red Hat Enterprise

1 2 3 4 5 6 7 ... 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice