Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (136)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 99 Next »

9%
PC over IP
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
are fanless and therefore completely silent. Depending on the model, the units are equipped with two to four DVI-D or DVI-I or DisplayPorts for connecting monitors. A keyboard and mouse and other USB devices
9%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
="300" \ op monitor interval="60" timeout="60"start-delay="0" To enable live migration, the configuration would need to be modified as follows: primitive p_vm-vm1 ocf:heartbeat:VirtualDomain params
9%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
commissioning and continuous monitoring in production are essential to ensure that hyperthreading offers the benefits you expect. In contrast, vCPUs are an abstraction that enables a VM to use computing
9%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, they are not monitored, although this does not apply to the Windows Management Instrumentation (WMI) persistence rule. In the next phase, you will exit audit mode and activate the defined rules. If you identified rules
9%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
table attacks. This technique significantly improves the security of hashed data and should be used by default. Implement continuous monitoring and evaluation processes to ensure the effectiveness
9%
Harden your Linux servers to stop malware
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Danila Krylov, 123RF.com
selected areas – not everything below the root (/) directory. Both services use the same configuration file, /etc/clamd.d/scan.conf. The following settings tell ClamAV to monitor the users' home directories
9%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
, as long as it has the minimum number of disks. If a disk fails, the RAID subsystem automatically removes it from the array. However, you need to monitor the RAID with a monitoring tool like Nagios to detect
9%
Managing SSH and other remote connections with PAC
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Ivan Datskov, 123RF.com
could monitor the network settings of the server, Marvin, in the bottom half while modifying the matching configuration file on the Milliways server at the top. The Take Screenshot item grab screenshots
9%
Request Tracker – the underestimated open source ticket system
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
Richard CAtA, 123RF.com
supports precise monitoring and evaluation of service levels. Links between various tickets are another organizational function in Request Tracker. You can use this feature to model dependencies between
9%
What's new in Small Business Server 2011
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
A&M Rovenko, 123RF
, as well as the Active Directory domain and Exchange organization tasks, run in the background. The server monitors all connected clients and can tell the administrator if a client needs patching or doesn

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice