Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (758)
  • Article (135)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 98 Next »

9%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
-reaching authorizations without immediately setting off the alarm bells on monitoring systems. Sometimes these techniques result from the functionality of Windows and Active Directory (AD). Stolen and Broken
9%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
for attackers if they aren't regularly updated or monitored. Improper configurations of your cloud platform, CI/CD tools, and weak access restrictions can also pose security threats. Lack of Compliance Failure
9%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
SSH server. Figure 2: The dashboard displaying important system parameters at the top, such as a simple monitoring view of the hosts (left) and virtual
9%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
Logging Yes Resource monitor Yes SNMP Yes S.M.A.R.T data No Internal apps No Lights-out management IPMI Port trunking
9%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity
9%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and even individual DLL files in special use cases, including the ability to distinguish between program and DLL versions. AppLocker can also create automatic policies and monitor specific directories
9%
Lmod – Alternative Environment Modules
30.01.2013
Home »  HPC  »  Articles  » 
Layton ## proc ModulesHelp { } { global version modroot puts stderr "" puts stderr "The compilers/open64/5.0 module enables the Open64 family of" puts stderr "compilers. It updates the \$PATH
9%
Link aggregation with kernel bonding and the Team daemon
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Steven Cukrov, 123rf.com
parameters but attempt to define custom values (e.g., for the MII link monitoring frequency). In the worst case, only a modinfo against the bonding module will help you find the required parameter – combined
9%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
their own filters. More specifically, these filters have access to the entire HTTP flow and can monitor or modify it according to the tools provided by the HTTP filter. The developers cite HTTP packet
9%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
Distributed Object Store (RADOS). The ceph-mon cluster monitor monitors the function and configuration of the cluster nodes. It stores information about the placement of data and the general state

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice