Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (758)
  • Article (135)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 98 Next »

9%
What's new in Ceph
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Domenico Loia on Unsplash
. In addition to monitoring, alerting, and trending (MAT) with Prometheus and Grafana, it now even offers the ability to change cluster configuration details (Figures 3 and 4
9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
are fanless and therefore completely silent. Depending on the model, the units are equipped with two to four DVI-D or DVI-I or DisplayPorts for connecting monitors. A keyboard and mouse and other USB devices
9%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
="300" \ op monitor interval="60" timeout="60"start-delay="0" To enable live migration, the configuration would need to be modified as follows: primitive p_vm-vm1 ocf:heartbeat:VirtualDomain params
9%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
commissioning and continuous monitoring in production are essential to ensure that hyperthreading offers the benefits you expect. In contrast, vCPUs are an abstraction that enables a VM to use computing
9%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, they are not monitored, although this does not apply to the Windows Management Instrumentation (WMI) persistence rule. In the next phase, you will exit audit mode and activate the defined rules. If you identified rules
9%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
table attacks. This technique significantly improves the security of hashed data and should be used by default. Implement continuous monitoring and evaluation processes to ensure the effectiveness
9%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
. The current version, 1.2.1, was released in August 2025. Actium (including the man page) is available from the manufacturer (mailto:info@gnupg.com). GnuPG actium (Figure 1) monitors the LDAP directory service
9%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
selected areas – not everything below the root (/) directory. Both services use the same configuration file, /etc/clamd.d/scan.conf. The following settings tell ClamAV to monitor the users' home directories
9%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
, but it already enjoys huge popularity because EDA allows the systems of an Ansible inventory to be monitored specifically for individual events. You define the rules (Figure 2), and if a specific event occurs
9%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
, as long as it has the minimum number of disks. If a disk fails, the RAID subsystem automatically removes it from the array. However, you need to monitor the RAID with a monitoring tool like Nagios to detect

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice