Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (136)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 99 Next »

10%
Kali Linux 2025.3 Released with New Hacking Tools
30.09.2025
Home »  News  » 
 
of Nexmon support to enable monitor mode and advanced wireless capabilities to the Raspberry Pi 5. With this new addition, you'll be able to sniff wireless packets and inject custom raw packets to assist
10%
New Products
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
 
to set up, monitor, and maintain a cloud infrastructure. RELS 2012 currently includes tools aimed at simplifying deployment and maintenance of enterprise IT infrastructure, specifically: ROSA Server
10%
Life on the Network
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Jesse lee Lang, 123RF
and OpenVZ virtualization. You'll also find a study of how to monitor virtual environments with Nagios and Icinga, and we include separate articles on top virtualization tools like KVM, Hyper-V, Xen
10%
Penetration Testing
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Snort IDS and monitoring Tor Browser Anonymity TrueCrypt Disk encryption Wireshark Sniffer
10%
Looking for System Admins …
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Piter Ivanov, 123RF
monitoring, clustering, and troubleshooting – for admins who manage Windows, Linux, Unix, and Solaris systems in heterogeneous environments. In these pages, you'll learn about some new features of the Windows
10%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
System and Hardware Monitoring htop System monitor (Figure 1) Android tools Various programs to manage and check data from smartphones and tablets inxi Discover
10%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
need to create the Upgrade Profile separately for each group in this case. Not Full-Fledged Monitoring For details on your systems, go to the Computers tab and select the machines in which you
10%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
chain security Figure 2 shows additional interdisciplinary functions. Of note are policy management and monitoring in the broadest sense (i.e., topics such as extended detection and response, XDR
10%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
therefore requires these attack surfaces to be monitored and evaluated 24/7. Similarly, analysts at Forrester Research in 2022 described ASM as "the process of continuously discovering, identifying
10%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
+Alt+2 changes to the monitor (Figure 4). Once there, you can restart the system or change to the virtual DVD, among other things. If the virtual machine is running on a server with no graphics output

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice