Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 92 Next »

12%
New ITIL framework and certification
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Dioptria, sxc.hu
     Incident management       Service request management      IT asset management       Validation and testing      Event management/monitoring B. Technical Management
12%
Simple Event Correlator
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © cepixx, 123RF.com
the many similar programs that can monitor logfiles. However, SEC has a lot of other rule types that expand its functionality considerably (Table 2). Table 2 SEC Rule Types Rule Type
12%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
any other services. This rather well-intentioned idea causes problems in many environments, however, such as when you need monitoring or backup software, change management tools, or other applications
12%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
WMI is unusual and suggests that this is only designed to work around antivirus programs that do not monitor such WMI activities. The decrypted downloader works almost identically, except that it loads
12%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
is explicitly designed to monitor users and their sessions and can detect the idle state of user sessions, enabled with the use of a separate PAM module, pam_systemd [10]. This module takes care of registering
12%
Response automation with Shuffle
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Kenneth Berrios Alvarez on Unsplash
). Shuffle fetches the input from your monitoring tools (e.g., an intrusion detection system) and passes this input on to any number of other tools for further action, such as to your network management tool
12%
GENEVE network tunneling protocol
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Eugene Zhyvchik on Unsplash
on switches and routers. Finally, security issues arise because GENEVE's encapsulation of multiple protocols and services in a single tunnel makes it difficult to monitor and control communications between
12%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
-new-apache-backdoor-in-the-wild-serves-blackhole/) New C-TIP Service Helps Hunt Botnets Microsoft launched a new service for monitoring and tracking botnet behavior in near-real time. The new Cyber Threat Intelligence Program (C-TIP) is an Azure
12%
New Products
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
 
SQL functions, and enhanced DDL features. It also has improved monitoring and profiling accessibility." Additionally, the Vectorwise 3.0 analytic database includes the Vectorwise Hadoop Connector
12%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
to analyze; then, open a command prompt with administrator privileges and change to the directory in which you installed the tool. Use the following command to monitor Group Policy: gplogview -o gpevents

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice