Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (31)
  • Article (2)
  • News (2)
Keywords

« Previous 1 2 3 4 Next »

19%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
to set up, monitor, and maintain a cloud infrastructure. RELS 2012 currently includes tools aimed at simplifying deployment and maintenance of enterprise IT infrastructure, specifically: ROSA Server
19%
Building a custom Cyberdeck
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
The idea of a dedicated terminal to investigate configuration inconsistencies and performance issues in a data center not thoughtfully configured with rackmount monitors and keyboards is an old one
19%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity
19%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
privileges. In the current directory (here, /home/layton jb /DATA_STORE ), check the content (Listing 1). Note that DATA1  is the mountpoint. Also notice the date on the compressed archive, because you
19%
Microsoft Active Directory Rights Management Services
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © vska, 123RF.com
. Logging AD RMS writes important information to the application, security, system, and AD RMS event logs on the AD RMS server. Some specific events that are critical to monitor are shown in Table 1
18%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
to an extensive battery of tools for deployment, virtualization, backup, and monitoring, as well as a hierarchical team of staff to care for it. If, for example, you forget about theoretical ideals
18%
Windows updates and patch distribution without WSUS
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Rob Thompson on Unsplash
and multifaceted. For example, the periodic assessment feature can be used to automate monitoring of the states of various virtual machines (VMs). In this case, the system carries out periodic checks to report
18%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
 
." The product comprises anti-malware, web reputation, firewall, intrusion detection, integrity monitoring, and log inspection modules in one integrated solution. Deep Security 9 also enables compliance with many
18%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
. The current version, 1.2.1, was released in August 2025. Actium (including the man page) is available from the manufacturer (mailto:info@gnupg.com). GnuPG actium (Figure 1) monitors the LDAP directory service
18%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
selected areas – not everything below the root (/) directory. Both services use the same configuration file, /etc/clamd.d/scan.conf. The following settings tell ClamAV to monitor the users' home directories

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice