Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (9)
  • News (7)
Keywords

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

16%
One metric to rule them all
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
, I'll examine the response of my laptop to: watch cat /proc/loadavg 0.03 0.03 0.07 1/362 23038 This is what an idle system looks like. When examining load average numbers, you should also be aware
16%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
, but the cause is often much more trivial. For example, roaming users who do not always have a network connection for their laptops will obviously not always be able to communicate with a central directory service
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
 
as a managed service that are accessible remotely on a variety of clients, including desktop systems, laptops, and even the iPad. However, the platform can be a bit tricky to spec out, so VMware is providing
16%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
16%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
includes tools such as dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy, which passively monitor networks for data of interest. The arpspoof, dnsspoof, and macof tools help intercept network
16%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
, such as plugging in or replacing a hard disk at run time. It also will monitor the processes it launches, if desired, and restart them in the case of a crash. To do all this, Upstart completely breaks
16%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
/prerm. With these scripts, you can install software, start services, and call a monitoring system to tell it exactly what's going on with the new instance. For example, open ./DEBIAN/postinst and add something like: curl
16%
Welcome
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © archman, 123RF.com
intelligence bot that monitors a person's actions and prevents them from clicking, answering questions, responding to bogus surveys, or picking up the phone and carrying on a conversation. This fact doesn't mean
16%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
, essentially creating a full-blown monitoring system that is scalable, versatile, and more informational. For more information, see: https
16%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice