Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (32)
  • Article (2)
Keywords

1 2 3 4 Next »

100%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
in particular – to identify their attack surfaces more precisely and respond more quickly to changes in their risk situation (see the "Prevention and NIS2" box). In their Leadership Compass publications on ASM [1 ... The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.
34%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
with different IP addresses, performance problems might raise the question of where the problem is situated. In the simplest case, separate checks are recommended: Check on domain name example.com , including
33%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
the Debian system. To do so, you first need to access your server's storage manager, which, in my case, is located at the top left-hand side of the DSM Main Menu (Figure 2). Next, create both a storage pool
32%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
now sports a small FPC ribbon connector exposing a single-lane PCIe 2.0 bus. NVM Express (NVMe) [2] drives connect to the PCIe bus via an M.2 [3] adapter – in this case, to the new M.2 HAT+ released
30%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
a large text file (war-and-peace.txt from Project Gutenberg [2]) saved in a local Amazon Simple Storage Service (S3)-compatible object storage (Figure 2). This type of object storage, being easy to deploy
29%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, signed drivers Yes 56a863a9-875e-4185-98a7 b882c64b5ce5 Stops Adobe Reader from creating child processes No 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Stops all Office
29%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, the greater this problem becomes. Compared with these basic issues, other challenges are more cosmetic. However, better technologies could significantly improve the situation in these cases, too. Just consider
29%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
Whether the Internet of Things (IoT) or a server landscape, microservices or cron jobs, applications produce all kinds of status messages that you need to collect and evaluate. Whether it's an alert
29%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
for "shoddy security, insincerity" and "cascades of security failures" [2]. MAPI: The Curse of Exchange Protocols Under the pressure of new European Union regulations such as the General Data Protection
29%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
the dimensions completely wrong and go for 56 vCPUs and 1.5TB of vRAM (shown in the figure as the red monster VM2). On the other hand, you could do it the right way: 26 cores or 52 hypertreads per NUMA node. I

1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice