Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 83 Next »

9%
News for Admins
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
 
that it isn't left around on disk across a reboot or logout." Howells continues to say, "Keyrings, however, cannot currently be monitored asynchronously, so the desktop has to poll for it – not so good
9%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
any other services. This rather well-intentioned idea causes problems in many environments, however, such as when you need monitoring or backup software, change management tools, or other applications
9%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
WMI is unusual and suggests that this is only designed to work around antivirus programs that do not monitor such WMI activities. The decrypted downloader works almost identically, except that it loads
9%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
is explicitly designed to monitor users and their sessions and can detect the idle state of user sessions, enabled with the use of a separate PAM module, pam_systemd [10]. This module takes care of registering
9%
Response automation with Shuffle
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Kenneth Berrios Alvarez on Unsplash
). Shuffle fetches the input from your monitoring tools (e.g., an intrusion detection system) and passes this input on to any number of other tools for further action, such as to your network management tool
9%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
on switches and routers. Finally, security issues arise because GENEVE's encapsulation of multiple protocols and services in a single tunnel makes it difficult to monitor and control communications between
9%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
-new-apache-backdoor-in-the-wild-serves-blackhole/) New C-TIP Service Helps Hunt Botnets Microsoft launched a new service for monitoring and tracking botnet behavior in near-real time. The new Cyber Threat Intelligence Program (C-TIP) is an Azure
9%
New Products
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
 
SQL functions, and enhanced DDL features. It also has improved monitoring and profiling accessibility." Additionally, the Vectorwise 3.0 analytic database includes the Vectorwise Hadoop Connector
9%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
to analyze; then, open a command prompt with administrator privileges and change to the directory in which you installed the tool. Use the following command to monitor Group Policy: gplogview -o gpevents
9%
News for Admins
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Gernot Krautberger, Fotolia
and passwords appears to have been obtained from previously compromised third-party services." The spokesperson added that the company is actively monitoring to prevent unauthorized access to user accounts

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice