Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 84 Next »

9%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
server in Windows Admin Center, select the website whose settings you want to change. If the server settings are not displayed, your monitor's resolution is not high enough. In this case, it might
9%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-ed25519 ssh-mitm The ssh-mitm [4] program supports security monitoring and lets you monitor your own SSH traffic. The developers want to highlight
9%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
. Something's Not Right The last thing to consider is security monitoring. Even in conventional network settings, it is a challenge for admins to detect something going wrong. The problem is significantly
9%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
Runtime Security Instrumentation (KRSI). The framework monitors complete data streams and sets up checkpoints at neuralgic points to enable applications to interrupt traffic flows. KRSI does
9%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
of GPOs, in the test. Monitoring Replication Replication, and therefore the distribution of changes in Active Directory, is one of the directory service's most important functions and is especially true
9%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
be displayed. Speaking of metrics data, integrating HAProxy into conventional and state-of-the-art monitoring systems is very simple thanks to previous work by many users and developers. The tool comes with its
9%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
Schedules CPU access to cgroups. perf_event Monitors threads of a task group on a CPU. Table 3 Relevant CGroup Parameters Parameter Function cpuset
9%
High availability with Oracle Standard Edition
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © aquir, 123RF.com
, of course, not with the monitoring and management capabilities that Data Guard offers. Standard Edition and High Availability Is high availability then possible only using the Enterprise Edition? A look
9%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
is the ability to set up monitoring for virtual servers in the cluster. You can find this setting in More Actions  | Configure Monitoring . Then, select the services to be monitored by the cluster. If one
9%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
information [1]. Centralized Network Management In the field of network security, the network controller plays an important role. The server service supports central control and monitoring of physical network

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice