Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (97)
  • Article (1)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

11%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
11%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
includes tools such as dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy, which passively monitor networks for data of interest. The arpspoof, dnsspoof, and macof tools help intercept network
11%
How Upstart boots Ubuntu-based systems
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
, such as plugging in or replacing a hard disk at run time. It also will monitor the processes it launches, if desired, and restart them in the case of a crash. To do all this, Upstart completely breaks
11%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
/prerm. With these scripts, you can install software, start services, and call a monitoring system to tell it exactly what's going on with the new instance. For example, open ./DEBIAN/postinst and add something like: curl
11%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
, essentially creating a full-blown monitoring system that is scalable, versatile, and more informational. For more information, see: https
11%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3
11%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
developed by Tobias Oetiker, has become the quasi-standard tool for storing network monitoring data. It allows administrators to store and visualize acquired data over time. RRDtool is now released under
11%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
manual effort. If these activities are not monitored, the rogue router establishes itself as the IPv6 default gateway. Additionally, it can use certain flags in the RA to control the DNS configurations
11%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
-based access monitoring on the switch. Now, you need to specify for each switch port you will be using that it is an access port with 802.1X port monitoring – as you can see for the Fastethernet0/1 port
11%
Managing VHD devices
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Roman Smitko, 123RF
conversion tools are available, administrators still depend on a virtual machine monitor and are thus forced to opt for one format. Setting Up VHD Disks You can easily create and mount a VHD file using

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice