Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (128)
  • Article (3)
  • News (3)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

25%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
Historically grown environments often use more than one monitoring system. For example, production might use Zabbix, while research uses Ganglia with its computing clusters, and IT swears ... The free Alerta fields alerts from several monitoring systems and delivers them in a web GUI or at the command line. ... Aggregate alerts from various monitoring systems
25%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Alterfalter, 123RF.com
on a server, consequences can be dire – from irked users to massive financial implications. Therefore, it is more important than ever in a highly networked world to be able to monitor the state of your server ... Icinga's developers grew weary of waiting for updates to the popular Nagios monitoring tool, so they started their own project. ... Monitoring network computers with the Icinga Nagios fork
25%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Itsallgood, Fotolia.com
The Performance Monitor in Windows Server 2008 R2 is a powerful tool for identifying performance issues. Compared with the previous version, very little has changed in terms of control. The tool ... Performance monitoring in Windows Server 2008 R2
25%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
Performance management comprises three sequential processes: monitoring, analysis, and modeling (Figure 1). Monitoring is the theme of this article, analysis is the ability to identify patterns ... Beyond monitoring: Mathematical load simulation in Perl
23%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
to repair a Samba cluster in the middle of the night because the Samba init script provided by Debian doesn't support the monitor target correctly, you will know exactly what I mean.) Maintaining OCF ... Admins who want to leverage the powers of Pacemaker rely on OCF resource agents to monitor the cluster. If you don't have an agent for a specific application, try writing your own. ... Monitoring your cluster with a home-grown OCF agent
20%
Bottom: The new top
07.10.2025
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Lucy Baldwin, 123RF.com
options, what makes btm special? It provides immediate and time series monitoring of CPU, memory, network activity, processes, and disk usage like other tools, but it does it with characteristic flair ... Bottom is the latest process and system monitoring terminal user interface tool, delivering lightweight but beautiful monitoring.
19%
Unifying events with Splunk
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sebastian Duda, 123RF.com
one version of the same operating system. Monitoring and managing system events and security events across such hybrid environments is no small feat. In this article, I intend to give special attention ... Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.
17%
Targeted defense against brute force attacks
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Andrii IURLOV, 123RF.com
To protect your system, sshguard takes a simple and effective approach, similar to that of a small intrusion detection system. The tool continually monitors logfiles for selected services ... The sshguard tool does more than just repel attacks; it monitors login attempts and blocks future access.
15%
vSphere 5 vs. XenServer 6
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kozinia, 123RF.com
operating system; wide-ranging management and monitoring solutions. License: Proprietary with open source components. Costs: Official pricing in a variety of currencies is available at the XenServer website ... the two products and evaluate the high-availability and monitoring strategies.
15%
Mandatory access control with Tomoyo Linux
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© 3drenderings, 123RF.com
Contrary to what you might think, Tomoyo Linux [1] is not a full-fledged Linux distribution, it is a kernel module for Linux that monitors active processes directly and restricts their access ... The Tomoyo Linux security module locks each process away into a separate jail, monitors all of the process's actions, and even helps with debugging, if so desired. Unlike other security solutions

« Previous 1 2 3 4 5 6 7 8 9 ... 14 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice