Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 96 Next »

13%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
the appropriate monitoring system. Subsequently, all it has to do is sound an alarm if an incident occurs. However, things are different in practice. Neither Nagios nor Icinga has an autodiscovery function. However
13%
HTTP Sniffer Httpry Can Now Parse IPv6
10.08.2011
Home »  News  » 
 
writes them to a logfile. Httpry can be used for debugging web applications, monitoring network traffing or enforcing browsing policies.
13%
Five Common Security Mistakes to Avoid
22.02.2023
Home »  News  » 
 
IT operations teams play a large role in security, says Christopher Tozzi. "It falls to them to deploy applications, monitor them for risks, and respond to security risks as they arise
13%
How to Check Resource Usage of Your Kubernetes Pod
07.04.2023
Home »  News  » 
 
An essential part of Kubernetes administration involves monitoring resource usage for your nodes, says Korbin Brown. “Checking how much CPU and RAM resources a pod is utilizing can tell you
13%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
can authenticate to the cloud platform. (I do this as the chris user, not the root user, to limit the permissions used on my laptop.) Next, agree to the pop-up in your browser that asks if you
13%
Bluetooth Vulnerability Makes Spying Easy
28.08.2019
Home »  News  » 
 
pairing to secure their connection.” The vulnerability exposes billions of smartphones, laptops, and industrial devices. There is nothing users can do to protect themselves at this time. According
13%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
? Does the organization have appropriate measures to ensure that continuous monitoring of the network is maintained to identify any potential security breaches? Does a current and comprehensive
13%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
PureOS that runs on the Librem laptops and 2-in-1 detachable laptop-and-tablet devices. The company is also working on a Linux based smartphone called Librem 5. The Brief History of Purism As a long
13%
Red Hat Rolls out RHEL 6.5
25.11.2013
Home »  News  » 
 
with very large memory. Another interesting new feature is the Precision Time Protocol (PTP), which supports application latencies in the microsecond range. The new release also includes network monitoring
13%
LinkedIn Opens APIs
06.08.2013
Home »  News  » 
 
Company Page APIs so that all developers can enable marketers to publish content to a LinkedIn company page, monitor comments in real-time, and retrieve metrics via API." According to Cowing's blog post

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice