Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 108 Next »

18%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
Enterprise asset monitoring can be a daunting and expensive task. If you are interested in asset monitoring but have avoided it in the past because of price or complexity, you can now get a fully ... We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
18%
Optimizing Windows Server 2016 performance
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Kirsty Pargeter, 123RF.com
.exe and is shown as Second Level Address Translation . SLAT allows the hypervisor to accelerate memory access. Measuring in the Right Place In general, before optimizing, you should use performance monitoring ... With Windows Server 2016, tweaking the settings and taking advantage of performance monitoring tools can help boost your system's performance.
18%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
To protect your system, sshguard takes a simple and effective approach, similar to that of a small intrusion detection system. The tool continually monitors logfiles for selected services ... The sshguard tool does more than just repel attacks; it monitors login attempts and blocks future access.
18%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
IT compliance is indispensable in both small and large businesses and should be monitored wherever possible. The Chef InSpec open source framework helps admins apply rules on servers in a fully ... Chef InSpec is a practical tool for automated compliance monitoring with an intuitive, declarative scripting language.
18%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
…" If the broker then detects that this client is no longer alive, it does as it was told and publishes the message with the desired topic. MQTT thus has monitoring installed: It's easy to write to clients ... Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
18%
Cloud security with AWS GuardDuty
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Amy Walters, 123RF.com
-party DNS server (e.g., Google, 8.8.8.8), GuardDuty cannot analyze the DNS logs. Figure 1: GuardDuty monitoring solution at a glance. Apart from ... AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
18%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
Create your own command center in small infrastructures or test environments with flexible dashboards that control and monitor relevant applications and services.
18%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
What happens when an intruder with a laptop parks at an empty cubicle and attaches to your local network? If you don't want to find out, it might be time to think about implementing some switch port
18%
Hack Uses Headphone Speakers To Record Sound
23.11.2016
Home »  News  » 
 
FBI Director James Comey and Facebook founder Mark Zuckerberg cover the webcams of their laptops with tape because they can be hacked easily. Zuckerberg, like many people concerned with privacy
18%
Tune your databases
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Altomedia, 123RF.com
development and continues into the production environment. Percona Monitoring and Management (PMM) [1] is an AGPL-licensed open source platform that, as its name suggests, will help you monitor and tweak your ... Release 2 of Percona Monitoring and Management for open source databases helps reign in inefficient queries and ensure you are making the best use of the available hardware.

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice