Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (758)
  • Article (135)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 98 Next »

9%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
be relied upon to examine a disk's status is smartctl, which provides access to a drive's Self-Monitoring, Analysis, and Reporting Technology (SMART) [6] metrics. Many people have remained skeptical about
9%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
Monitoring and Data Masking versions also monitor who has sent which queries to the database, or they mask certain data, such as employees or customers. In general, potential attackers will not notice
9%
Detecting and analyzing man-in-the-middle attacks
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Soner Eker on Unsplash
Interfaces button opens a dialog with the local interfaces that you can use for monitoring. The Input tab provides the network interfaces that Wireshark uses for sniffing. Equally important is Edit
9%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
that they should be learned when just getting started with Linux, and the same goes for HPC-specific situations. The ssh  command is a grand HPC command that you use as part of setting up, using, and monitoring HPC
9%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
9%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
includes tools such as dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy, which passively monitor networks for data of interest. The arpspoof, dnsspoof, and macof tools help intercept network
9%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
network traffic do not block the network. Many admins use their own servers for the monitor servers (MONs), the guard dogs that monitor the cluster and enforce its quorum; however, MONs require virtually
9%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
implement and monitor far stricter rules, which are then relaxed again during normal business hours. Even though a company's users are always portrayed as the highest risk vulnerability, they are really your
9%
Tech News
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
 
into their IT operations for infrastructure and applications has been diminished." This lack of visibility and monitoring capabilities leads to organizational gaps, says Kerner, including the ability to effectively conduct
9%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
administrative units by running the cmdlet Get-Command *AzureAD*AdministrativeUnit* When assigning administrative units to specific users or groups, user logons should be monitored. This also applies

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice