Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 92 Next »

12%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
overhead. On top of this, every application on an Azure Cloud operating system has its own IP address, a concept that has potential for terminal devices (hosts, laptops) on IPv6. On the other hand
12%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
stores the data there. That aside, the BadUSB function is easy to use. Starting at the Main Menu, choose Bad USB , select the payload script, connect the device to the laptop, and Run the script. Flipper
12%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
candidate in the test, Phraseanet monitors directories specified by the admin and automatically imports new files. After creating the folder, users should create an empty file there called .phrasea
12%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
and users can track which app causes how much data traffic. Figure 1: Only one monitoring app among many: Network Log sniffing network traffic on a rooted
12%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
left out some settings because they (probably) can never be realized in practice. For example, some configurations are set to monitor instead of deny or force. You may well be shocked to discover how
12%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
environment, and the creator usually gives superb feedback to solve your questions. The clean configuration makes Hiawatha a breeze to configure. Monitoring. An integrated monitoring tool is available
12%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
for sending or relaying email is more extensive than in Exchange and, above all, more stable. Because IceWarp supports many features and standards, many system services are used that can be monitored
12%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
. Besides the processor and memory, the Xeon Phi accelerator card also has sensors for monitoring temperature and power consumption. A system management controller makes this accessible to both the Xeon Phi
12%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
the performance values of the current deployment and extract monitoring information. The web interface always runs on the management VM, which admins will most likely prefer to the Cloudify shell because it works
12%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
-based QoS (class-based queuing, CBQ). * /sbin/ifcfg – Replaces the IP address management option in ifconfig. * /sbin/rtmon – Enables monitoring of the routing table. * /sbin/tc – Used to configure

« Previous 1 ... 63 64 65 66 67 68 69 70 71 72 73 74 75 76 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice