Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 83 Next »

10%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
-reaching authorizations without immediately setting off the alarm bells on monitoring systems. Sometimes these techniques result from the functionality of Windows and Active Directory (AD). Stolen and Broken
10%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
for attackers if they aren't regularly updated or monitored. Improper configurations of your cloud platform, CI/CD tools, and weak access restrictions can also pose security threats. Lack of Compliance Failure
10%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
SSH server. Figure 2: The dashboard displaying important system parameters at the top, such as a simple monitoring view of the hosts (left) and virtual
10%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
Logging Yes Resource monitor Yes SNMP Yes S.M.A.R.T data No Internal apps No Lights-out management IPMI Port trunking
10%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
to Greg about his background and some of his projects in general and about his latest initiative, Singularity, in particular. (Also see the article on Singularity.)   Jeff Layton: Hi Greg, tell me bit
10%
mpi4py – High-Performance Distributed Python
12.11.2020
Home »  HPC  »  Articles  » 
Layton has been in the HPC business for almost 25 years (starting when he was four years old). He can be found lounging around at a nearby Frys enjoying the coffee and waiting for sales.
10%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
Layton ## proc ModulesHelp { } { global version modroot puts stderr "" puts stderr "The compilers/open64/5.0 module enables the Open64 family of" puts stderr "compilers. It updates the \$PATH
10%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
concept. It includes the IPVS kernel code, cluster monitoring tool and web-based cluster configuration tool. The Piranha monitoring tool has two main features: Heartbeating between active and backup
10%
Link aggregation with kernel bonding and the Team daemon
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Steven Cukrov, 123rf.com
parameters but attempt to define custom values (e.g., for the MII link monitoring frequency). In the worst case, only a modinfo against the bonding module will help you find the required parameter – combined
10%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
their own filters. More specifically, these filters have access to the entire HTTP flow and can monitor or modify it according to the tools provided by the HTTP filter. The developers cite HTTP packet

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice