Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (136)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 99 Next »

9%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
center? Moreover, how will the underlying network configuration, IP addresses, and DNS cope with this? Simplifications in the form of system monitoring and intelligence, in combination with automatic
9%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
, monitor, and update your devices directly on the Internet (also called over the air, or OTA). For executing device management operations in a consistent way across different hardware platforms, some
9%
Export and analyze Azure AD sign-in and audit logs
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
in the Monitoring section of the AAD portal. You will then see an overview of available workbooks. Microsoft has started to publish predefined reports as part of the engine changeover. Of course, you can leverage
9%
Microsoft PowerToys for Windows 10
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Kenney Badboy on Unsplash
layouts. Many monitor manufacturers offer such tools to allow the easy positioning of windows, especially when using large, wide-screen displays. The Shortcut Guide tool launches when you press the Windows
9%
Elephant Shed PostgreSQL appliance
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © victor zastolskiy, 123RF.com
a database server. Among other things, you can use it for fine-tuning, to monitor its vitals, and to design and execute a backup strategy. The appliance uses Prometheus [2] and Grafana [3] to collect
9%
Network traffic utilities bandwhich and iftop
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Ildar Galeev, 123RF.com
about the -i and -n switches you can use with bandwhich. If you want to monitor the eth0 network interface instead of a WiFi interface, then use the -i switch. If you want to turn off DNS resolution
9%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
, performance monitoring, and a plethora of other dashboards. The first week your IDS or SIM is running, everyone watches it, trying to catch an invader in their enterprise. Then, when the sheer amount of data
9%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
be relied upon to examine a disk's status is smartctl, which provides access to a drive's Self-Monitoring, Analysis, and Reporting Technology (SMART) [6] metrics. Many people have remained skeptical about
9%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
Monitoring and Data Masking versions also monitor who has sent which queries to the database, or they mask certain data, such as employees or customers. In general, potential attackers will not notice
9%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Interfaces button opens a dialog with the local interfaces that you can use for monitoring. The Input tab provides the network interfaces that Wireshark uses for sniffing. Equally important is Edit

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice