Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 83 Next »

10%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
Information and Event Management (SIEM) application. SIEMs are multipurpose tools for the security operations professional. They offer asset discovery, behavioral monitoring, data aggregation and correlation
10%
A REST API automation strategy for DevOps
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image by Alex Kotliarskyi on Unsplash
management software, application release management platforms, monitoring, batch job scheduling software, and cloud automation solutions. In the past, when software releases only took place once a year and all
10%
Fedora 24 and Knoppix 7.6
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Fedora 24 Server Fedora 24 Server operating system lets system administrators make use of the latest server-based technologies. Cockpit offers a modern web interface from which to monitor system
10%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
need to create the Upgrade Profile separately for each group in this case. Not Full-Fledged Monitoring For details on your systems, go to the Computers tab and select the machines in which you
10%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
chain security Figure 2 shows additional interdisciplinary functions. Of note are policy management and monitoring in the broadest sense (i.e., topics such as extended detection and response, XDR
10%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
therefore requires these attack surfaces to be monitored and evaluated 24/7. Similarly, analysts at Forrester Research in 2022 described ASM as "the process of continuously discovering, identifying
10%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
+Alt+2 changes to the monitor (Figure 4). Once there, you can restart the system or change to the virtual DVD, among other things. If the virtual machine is running on a server with no graphics output
10%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
. A fourth application could monitor the content of the stored data and sound the alarm if certain content appears or certain events occur during a write. Microapplication five could be used to deliver
10%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
, the DLP function also monitors other services. For Microsoft 365, these include Teams, SharePoint, and OneDrive. Also on the table are the Office applications such as Word, Excel, and Power
10%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
installation. You install a service that monitors the network and a central acquisition service that prepares the information. The installation can be on dedicated servers or on a server with other roles. Once

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice