Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 92 Next »

12%
User licensing in Microsoft networks
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Wong Yu Liang, 123RF.com
. User licenses give users access to a server from their devices (e.g., PCs, laptops, tablets, or smartphones). To find the best approach for an enterprise, you always need to do the math. Licenses
12%
Linux I/O Schedulers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © pandavector, 123RF.com
The Linux kernel is a very complex piece of software used on a variety of computers, including embedded devices that need real-time performance, hand-held devices, laptops, desktops, servers
12%
A Substitute for cron
18.03.2013
Home »  Articles  » 
 
on certain conditions. The syntax for this is: when : For example, the Whenjobs changes function lets you monitor when a variable changes. Using the above variables, you can thus
12%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
of traveling around the world talking with IT techs and cybersecurity workers, I've asked them about "killer cyber analytics tools." Invariably, they talk about monitoring logfiles and system processes
12%
Moving Data Between Virtual Machines
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © alphaspirit, 123RF.com
sniffer. Two Approaches to Monitoring The benefit of using a VM as your packet collector on the server is that you don't need any additional hardware. The drawback, however, is that this approach
12%
Secure Active Directory with the rapid modernization plan
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Milos Kojadinovic, 123RF.com
monitors security-related activities of user accounts, such as those caused by hackers moving around the corporate network. The activities can include brute force login attempts, unusual changes to group
12%
The simpler alternative to cron: Whenjobs
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© stillfx, 133RF.com
for this is: when : For example, the Whenjobs changes function lets you monitor when a variable changes. Using the above variables, you can thus formulate a condition such as "if free
12%
Nagios alerts implemented via VoIP
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Zentilia, 123RF.com
than trivial, and setting up a complete PBX just for monitoring is slightly over the top; however, you can sign up for a SIP (Session Initiation Protocol) account for not too much money, add a CLI SIP
12%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
for submitting virtual machines and monitoring their status. The front end also runs services that manage and monitor all virtual machines running on different machines in the cluster. And, it hosts the virtual
12%
Virtualization with KVM
29.06.2011
Home »  CloudAge  »  Articles  » 
 
, you also need to disable the power saver function by adding -no-acpi. Figure 6: The Qemu Monitor lets you control your virtual machines. The "info block

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice