Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • News (10)
  • Article (9)
Keywords

1 2 3 4 5 6 7 8 Next »

100%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
A virtual private network (VPN) can typically be described as a solution that allows an encrypted secure connection, often referred to as a tunnel, to be established to a private network. Many ... Open Source, network, secure, multifactor authentication
89%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
, intelligent network platform. The benefits offered by this kind of integration are huge: Besides significant efficiency boosts attributable to the automation of building services, the technology also improves ... The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail ... Purdue Model for industrial networking
80%
Web-based network monitoring
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © arasdubov, 123RF.com
Permanent monitoring of IT infrastructures is a routine task for every network admin. Depending on the scope and complexity of existing installations, several tools are used for this purpose ... Web-based network monitoring
65%
Palo Alto Networks Introduces Cortex Cloud
28.02.2025
Home »  News  » 
 
Palo Alto Networks has released Cortex Cloud, which merges Prisma Cloud with Cortex CDR. This new version offers cloud detection and response capabilities along with AI-powered prioritization ... Palo Alto Networks Introduces Cortex Cloud
60%
DigitalOcean Kubernetes Service Doubles Cluster Capacity
08.04.2025
Home »  News  » 
 
: Increased cluster capacity from 500 to 1,000 worker nodes per cluster. Optimized networking with VPC-native Kubernetes. Improved performance with eBPF-powered networking. Managed Cilium for high ... Enhancements include improved networking and performance.
55%
IP Fabric 7.0 Released
21.02.2025
Home »  News  » 
 
IP Fabric has announced the 7.0 release of its Automated Network Assurance Platform, which aims to provide the necessary insight and control to manage complex cloud, security, and network ... Check out the updates to the Automated Network Assurance Platform.
54%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
The Internet small computer systems interface (iSCSI) [1] is a block-level [2] interfacing protocol used in conjunction with any network-attached storage (NAS) unit. As the name implies, iSCSI uses ... The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI. ... Storage across the network with iSCSI and Synology DiskStation Manager
43%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
, click Networking | Check HTTP web service . Don't confuse this option with the old check (check_http), which is still available under Check HTTP service (deprecated) . In the simplest version ... Checkmk offers a new open source monitoring implementation for network services.
38%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity ... The Falco tool promises comprehensive threat detection for Docker, Podman, and Kubernetes from network traffic streams.
38%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
search for would-be attackers on your network. Detection Managing legacy intrusion detection and intrusion prevention systems involves a great deal of effort, partly because hybrid approaches consisting ... This traffic analysis software identifies malicious traffic on your network with the use of established sources.

1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice