Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 84 Next »

9%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
.Resources/resourceGroups" } Checking the UI opened up in your browser, you should see that after a quick page refresh, the resource group is indeed present and in the correct location. Optionally, you might need to monitor
9%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
and operating a platform requires additional software, including operating tools – life-cycle management, monitoring, logging, auditing, metering, continuous integration (CI), etc. – and user and authorization
9%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
compilers/gcc-4.6.2 ## ## modulefiles/compilers/gcc-4.6.2. Written by Jeff Layton ## proc ModulesHelp { } { global version modroot puts stderr "compilers/gcc-4.6.2 - sets the Environment
9%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
, indeed. The Author Jeff Layton has been in the HPC business for almost 25 years (starting when he was 4 years old). He can be found lounging around at a nearby Frys enjoying the coffee and waiting
9%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
on the right side under the Images heading. Logstalgia can also continually monitor an access log, which turns the software into an attractive monitoring tool. If you run it in a different window, you can see
9%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
management systems. In firewall mode, only authorized queries are passed in to the database; GreenSQL responds to unauthorized queries with an empty result set. The commercial Activity Monitoring and Data
9%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
auditing and penetration testing. The dsniff suite includes tools such as dsniff, filesnarf, mailsnarf, nsgsnarf, urlsnard, and webspy, which passively monitor a network for interesting data. (Arpspoof
9%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
collections distribute RAs to local communication partners without any substantial manual effort. If these activities are not monitored, the rogue router establishes itself as the IPv6 default gateway
9%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
center? Moreover, how will the underlying network configuration, IP addresses, and DNS cope with this? Simplifications in the form of system monitoring and intelligence, in combination with automatic
9%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
, monitor, and update your devices directly on the Internet (also called over the air, or OTA). For executing device management operations in a consistent way across different hardware platforms, some

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice