Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (151)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 91 Next »

19%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
Logging is of such importance in security monitoring and troubleshooting that easy access to the information buried in logfiles is essential. The Logwatch tool monitors logs and analyzes and reports
19%
NetIQ Releases Change Guardian 4.0
11.04.2013
Home »  News  » 
 
. Change Guardian 4.0 includes “before and after” information about changes to critical files and settings and offers policy-based monitoring required for compliance with various regulations and best ... NetIQ announces the release of Change Guardian 4.0, the company’s privileged-user activity and change-monitoring solution.
19%
Linux Kernel 5.17 Code Merge Window is Closed
31.01.2022
Home »  News  » 
 
64 architecture. ARM is also gaining support for Snapdragon 8 (gen 1) and X65 platforms. AMD is bringing k10temp-based CPU temperature monitoring for its AMD Zen 19h line of CPUs. AMD also sees
19%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
Enterprise asset monitoring can be a daunting and expensive task. If you are interested in asset monitoring but have avoided it in the past because of price or complexity, you can now get a fully ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
19%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
.exe and is shown as Second Level Address Translation . SLAT allows the hypervisor to accelerate memory access. Measuring in the Right Place In general, before optimizing, you should use performance monitoring ... With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.
19%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
IT compliance is indispensable in both small and large businesses and should be monitored wherever possible. The Chef InSpec open source framework helps admins apply rules on servers in a fully ... Chef InSpec is a practical tool for automated compliance monitoring with an intuitive, declarative scripting language.
19%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
…" If the broker then detects that this client is no longer alive, it does as it was told and publishes the message with the desired topic. MQTT thus has monitoring installed: It's easy to write to clients ... Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
19%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
-party DNS server (e.g., Google, 8.8.8.8), GuardDuty cannot analyze the DNS logs. Figure 1: GuardDuty monitoring solution at a glance. Apart from ... AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
19%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
Create your own command center in small infrastructures or test environments with flexible dashboards that control and monitor relevant applications and services.
18%
Hack Uses Headphone Speakers To Record Sound
23.11.2016
Home »  News  » 
 
FBI Director James Comey and Facebook founder Mark Zuckerberg cover the webcams of their laptops with tape because they can be hacked easily. Zuckerberg, like many people concerned with privacy

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 91 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice