Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (9)
  • News (6)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

16%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
, but the cause is often much more trivial. For example, roaming users who do not always have a network connection for their laptops will obviously not always be able to communicate with a central directory service
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
as a managed service that are accessible remotely on a variety of clients, including desktop systems, laptops, and even the iPad. However, the platform can be a bit tricky to spec out, so VMware is providing
16%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
16%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
includes tools such as dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy, which passively monitor networks for data of interest. The arpspoof, dnsspoof, and macof tools help intercept network
16%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
the clarity and streamlining of its architecture. An inherently immutable system that can be controlled and fully monitored from the outside by the API tends to make you want more, especially given
16%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
, such as plugging in or replacing a hard disk at run time. It also will monitor the processes it launches, if desired, and restart them in the case of a crash. To do all this, Upstart completely breaks
16%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
/prerm. With these scripts, you can install software, start services, and call a monitoring system to tell it exactly what's going on with the new instance. For example, open ./DEBIAN/postinst and add something like: curl
16%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
managed observability platform designed specifically for Rancher-managed Kubernetes clusters. The platform lets enterprises "monitor mission-critical workloads in Rancher-managed Kubernetes clusters across
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
, essentially creating a full-blown monitoring system that is scalable, versatile, and more informational. For more information, see: https
16%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice