Tech et Jeux Vidéo
ADMIN Network & Security

ADMIN Network & Security January/February 2020

ADMIN Network & Security magazine is your source for technical solutions to the real-world problems you face every day. Published six times per year, every issue includes the latest techniques for better network security, system management, troubleshooting, performance tuning, virtualization, cloud computing, and more!

United States
Linux New Media
Lire plus
13,92 €(TVA Incluse)
52,19 €(TVA Incluse)
6 Numéros

dans ce numéro

3 min.
educating a sys admin

Education is important, but is it important in technology-related fields? The widely held opinion is that education is not as important for techies. I recently had a friendly debate with a colleague about whether system administrators need a degree. By degree, we meant an associate’s, bachelor’s, master’s, or other equivalent educational certificate from an accredited college or university. Spoiler: We both agreed that a degree isn’t required. However, the debate didn’t end there because, in my opinion, professionals who are in professional positions should have a degree. Now, having said that, I’ve never heard of a degree program in system administration – at least not at the bachelor’s level or beyond. Some two-year programs offer system administration as part of their IT-related curriculum, but I know of no formal computer information systems…

1 min.
on the dvd

OpenSUSE Leap is a community distribution that shares a common code base with SUSE Linux Enterprise (SLE) and coordinates with SLE releases (i.e., SLE is also in version 15). SUSE recommends Leap for “Sysadmins, Enterprise Developers, and ‘Regular’ Desktop Users.” Please note that the image on this DVD is not the Live version and will try to install the new operating system. Released December 2019 Gnome or KDE (Plasma 5.12) desktop, as well as lightweight options Appropriate for traditional and software-defined infrastructure Comprehensively tested for hardened codebase DEFECTIVE DVD? Defective discs will be replaced, email: cs@admin-magazine.com While this ADMIN magazine disc has been tested and is to the best of our knowledge free of malicious software and defects, ADMIN magazine cannot be held responsible and is not liable for any disruption, loss, or…

5 min.
tech news

Canonical Now Offers an Ubuntu Pro Image for AWS Ubuntu rules the cloud. According to The Cloud Market (https://thecloudmarket.com/stats#/by_platform_definition), Ubuntu is the most widely used cloud image used on the Amazon Elastic Compute Cloud (with nearly 370K images deployed). Not one to be satisfied with being at the top of the digital heap, Canonical (https://canonical.com/) – the company behind Ubuntu (https://ubuntu.com/ – has released a new version of their venerable Ubuntu platform. Ubuntu Pro was created specifically for Amazon Web Services. This new image ships with the Canonical standard Ubuntu Amazon Machine Image and layers on top of that security and compliance subscriptions. Specifically, Ubuntu Pro includes: • Up to 10 years of package and security updates for Ubuntu 18.04, and up to eight years for 14.04 and 16.04• Kernel Livepatch for continuous…

9 min.
kicking it into overdrive

The idea of block I/O caching isn’t revolutionary, but it still is an extremely complex topic. Technically speaking, caching as a whole is complicated and a very difficult solution to implement. It all boils down to the I/O profile of the ecosystem or server on which it is being implemented. Before I dive right in, I want to take a step back, so you understand what I/O caching is and what it is intended to address. What Is I/O Caching? A computer cache is a component (typically leveraging some sort of performant memory) that temporarily stores data for current write and future read I/O requests. In the event of write operations, the data to be written is staged and will eventually be scheduled and flushed to the slower device intended to store…

13 min.
number, please

Mapping internal IP addresses to external IP addresses is essential for Voice over IP (VoIP) communications through network address translation (NAT) gateways and firewalls. Session Initiation Protocol (SIP) is the signaling protocol for establishing VoIP connections; however, SIP-based communications have problems working through firewalls and session border controllers, and all too often, VoIP calls or some unified communications functions fail because of NAT. In this article, I show you how IT managers can resolve these issues with the session traversal utilities for NAT (STUN), traversal using relays around NAT (TURN), and Interactive Connectivity Establishment (ICE) techniques to ensure transparent transitions and improve overall SIP security. NAT Characteristics Some years ago, the limited availability of IP addresses led to the development of various strategies by the Internet Engineering Task Force (IETF) for covering…

9 min.
behind time

SchedViz [1] is one of a variety of open source tools recently released by Google that allows you to visualize how your programs are being handled by Linux kernel scheduling. The tool allows you to see exactly how your system is treating the various tasks it is running and allows you to fine-tune the way resources are allotted to each task. SchedViz is designed to overcome a specific problem: The basic Linux tools available for scheduling [2] don’t allow you to see very much. In practice, this means that most people guess how to schedule system resources, and given the complexity of modern systems, these guesses are often wrong. Multiprocessing Modern operating systems (OSs) execute multiple processes simultaneously by splitting the computing load across multiple cores and running each process for a short…