Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 84 Next »

9%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
a notebook, you first need to set the wireless LAN adapter to monitor mode. To do this, execute the following two commands: $ airmon-ng airmon-ng start wlan1 Now you can record wireless traffic
9%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
will perform some tasks after a restart. During this time, you will only see an AWX is Upgrading message in the browser instead of the login screen. You can monitor the progress with: sudo docker logs -f awx
9%
Migrate your workloads to the cloud
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Peapop, Fotolia.com
to be operated and rolls out a corresponding VM in which the application then runs. The advantage is that the cloud's PaaS components often offer smart add-on functions such as automatic load monitoring, which
9%
Layer 3 SDN
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kirsty Pargeter, 123RF.com
systems can change continuously in Calico. If you wanted to map this manually, you would have to use solutions such as the inotify API to monitor the relevant configuration files, rewrite them
9%
DNS filtering with authentication
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Nathan Dumlao on Unsplash
with the number of users. However, latency is not the only problem: Proxy servers primarily specialize in filtering HTTP connections. This limitation can be solved with the help of a DNS filter, which can monitor
9%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
missing in Terraform. If you use the Prometheus monitoring, alarming, and trending solution, for example, you can set up basic Pulumi integration right away. The tool integrates running stacks
9%
Best practices for secure script programming
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Jorge Fernández Salas on Unsplash
" echo > /tmp/mydata chmod og-rwx /tmp/mydata echo "$SECRETDATA" > /tmp/mydata Problems arise if an attacker monitors the temp file with the very fast acting FileSystem Watcher API. In the case
9%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
/host_vars/node1.osism.test.yml (Listing 4). Listing 3 20-roles [generic] manager.osism.test node1.osism.test [manager] manager.osism.test [monitoring] manager.osism.test [control] node1.osism
9%
OPA and Gatekeeper enforce policy defaults in Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Mac Gaither on Unsplash
their conventional relatives; they need different but equally well-monitored compliance. A container environment is where the Open Policy Agent (OPA) [1] with its Kubernetes sidecar on the one hand and the Gatekeeper
9%
Nested Kubernetes with Loft
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Andrea Davis on Unsplash
5). Figure 5: The Loft developers have also thought of interfaces for state-of-the-art monitoring systems such as Prometheus. ©Loft Different

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice