Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (15)
  • News (2)
  • Article (1)
Keywords

1 2 Next »

100%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity ... The Falco tool promises comprehensive threat detection for Docker, Podman, and Kubernetes from network traffic streams.
87%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
When IT teams set out to monitor the Internet of Things (IoT), they too often settle for situations where, say, a networked sensor sends plausible measurements at an expected interval, which ... Keeping track of a large number of Internet of Things devices means understanding IoT networks, developing suitable monitoring metrics, and (ideally) integrating the IoT with infrastructure
64%
Together AI Announces Instant Clusters
19.09.2025
Home »  News  » 
 
for AI training, inference, and fine-tuning at scale,” the company says. Instant Clusters also feature NVIDIA Quantum-2 InfiniBand and NVLink networking, with the choice of Kubernetes or Slurm
60%
Tails 7.0 Announced
10.10.2025
Home »  News  » 
 
The Tails team has released version 7.0 of Tails, a portable Linux-based operating system that “uses the Tor network to protect your privacy online and help you avoid censorship.” This release
59%
Checking DNS configurations for errors
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by MW on Unsplash
A Domain Name System (DNS) name resolution configuration that is not carefully considered or simply incorrect will tend to cause a variety of problems on a network. Unstable server-based services
58%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
options, what makes btm special? It provides immediate and time series monitoring of CPU, memory, network activity, processes, and disk usage like other tools, but it does it with characteristic flair
57%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
a git push over SSH. Not all Linux statuses can be queried with the Goss onboard tools. For example, the tool detects whether the MariaDB process is running and listening on a specific network port
56%
Session cookies as targets for criminals
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Vyshnavi Bisani on Unsplash
in awareness training courses is the man-in-the-middle attack, in which attackers intercept data traffic on unsecured networks, such as public WiFi networks in hotels or cafés. Because almost all web
55%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
Configuration Protocol (DHCP), and Trivial File Transfer Protocol (TFTP) – assuming the network configuration allows you to do so. Organizations that deal with large numbers of servers instead need a largely
55%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
in the first line. If you do not have a public domain or are trying out the setup on your local network, remove the hash in line 3. Caddy will then use self-signed certificates. Alerta is then accessible

1 2 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice