Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 201 Next »

17%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
is useful if you can't actively check the computer because it resides behind a firewall, for example. A large number of plugins [4] already exist for various styles in Nagios and Icinga. But before the first
17%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
Collaboration Open Telekom Cloud [4]. A Full Stack Re-Engineered The grommunio developers chose a completely different approach: Instead of plugins and workarounds, they have been (re-)implementing more than 50
17%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
] and Nagios Plugins [4]; Checkmk developers use the Monitoring Plugins version and quickly rejected the possibility of modernizing the existing check with pull requests. The maintainers would have been burdened
17%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
with commands such as top or by looking in the /proc filesystem. However, clever rootkits nest themselves into the kernel and conceal the existence of the virus process there, which is where Rootkit Hunter [4
17%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
debuted in Ubuntu 11.10. The initctl show-config command that gives an overview of the jobs has been around since Upstart 0.6.4 (Figure 3): initctl show-config -e > output
17%
A standard cloud computing API
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Cannon, and Eclipse. The goal of Cloud Engine is to implement an open source cloud broker (Figures 4 and 5). The Deltacloud API is used here to facilitate views on the virtual clouds of each user, as well
17%
Virtualization with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
machines with a 32-bit operating system and 64-bit system, but not the other way around. Using a 64-bit kernel as your basis also has the advantage that you can use more than 4GB of RAM. Thus, you can run
17%
Identify troublesome energy consumers with PowerTOP
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Elena Elisseeva, 123RF.com
and computational resources. The processor saves the most energy in the C3 and C4 states, which is where you want it to spend the most time. Ideally, the CPU will sleep for 95 percent of the time in one of these two
17%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
client requests (1) in the auth.log file (2). Then sshguard (3) monitors the file and creates a firewall rule (4) that blocks the client (5) if it notices to many login attempts. If the attacker
17%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
a firewall). A large number of plugins [4] already exist for various styles in Nagios and Icinga. But before the first check, the administrator needs to configure the computers and the services to monitor

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice