Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 92 Next »

13%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
of specific security rules, sophisticated monitoring, and monitoring of rolled-out resources. That sounds wonderful, but does it work in the real world? How complex is getting started with Spacelift, and how
13%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
cycles. Thus, a persistent image can be located on an NFS volume while a volatile image is copied to the hypervisor at start time. The configuration and monitoring stacks are completely separate in Open
13%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
Hypervisor Project Backed by several powerhouses in the tech industry, The Linux Foundation is set to release a virtual machine monitor specific for modern cloud workloads. The Cloud Hypervisor virtual
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
in transit and when stored, employing monitoring to warn whether anything out of the ordinary is occurring, and relying on training to prepare system users not to engage in unsafe practices that might
13%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
-based answers are always better than guesses or suppositions. What's the best way to have data? Be a lumberjack and log everything. Logging Regardless of what you monitor, you need to be a lumberjack and log it
13%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
If you want to use Windows Server 2012, Windows 8, Windows RT, Windows Phone 8, or Exchange Server 2013, then SQL Server 2012 and SharePoint 2013 also need a compatible monitoring and management
13%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
you use them. In the past, most admins relied on run-of-the-mill event monitoring with thresholds: If the incoming data volume exceeded a certain limit, the monitoring system sounded an alarm. If too
13%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
monitoring tools. The next step is to create and run the container for a user. As the sys admin, you create a user account and share the credentials for the user to access the Linux server. The objective
13%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
Administrators monitor key network connections to detect issues (e.g., congestion) at an early stage. The Simple Network Management Protocol (SNMP) is often used for this purpose to query
12%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods, such as honeypots, are required

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice