Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (151)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 91 Next »

13%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
Hypervisor Project Backed by several powerhouses in the tech industry, The Linux Foundation is set to release a virtual machine monitor specific for modern cloud workloads. The Cloud Hypervisor virtual
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
in transit and when stored, employing monitoring to warn whether anything out of the ordinary is occurring, and relying on training to prepare system users not to engage in unsafe practices that might
13%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
-based answers are always better than guesses or suppositions. What's the best way to have data? Be a lumberjack and log everything. Logging Regardless of what you monitor, you need to be a lumberjack and log it
13%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
If you want to use Windows Server 2012, Windows 8, Windows RT, Windows Phone 8, or Exchange Server 2013, then SQL Server 2012 and SharePoint 2013 also need a compatible monitoring and management
13%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
you use them. In the past, most admins relied on run-of-the-mill event monitoring with thresholds: If the incoming data volume exceeded a certain limit, the monitoring system sounded an alarm. If too
13%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
monitoring tools. The next step is to create and run the container for a user. As the sys admin, you create a user account and share the credentials for the user to access the Linux server. The objective
13%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
Administrators monitor key network connections to detect issues (e.g., congestion) at an early stage. The Simple Network Management Protocol (SNMP) is often used for this purpose to query
13%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods, such as honeypots, are required
13%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
One benefit of using Azure Management Services is that servers managed with Azure Arc are displayed as objects on the Azure portal. These servers can therefore be inventoried, updated, and monitored
13%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
(and that’s the subject of another article). If you want to extend your programming to larger systems, you will need something larger than your desktop or laptop computer. Later, I will present some

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 91 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice