Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (758)
  • Article (135)
  • News (75)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 97 Next »

9%
Netcat – The admin's best friend
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Dmitry Rukhlenko, 123RF.com
be a random port-scanning hacking tool, a whitehat security tool, and a server or a client; it performs monitoring, supports tunneling, and is a simple TCP proxy server on top of that! Hard to believe, I
9%
Free Security Compliance Manager hardens server systems
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Shironosov, 123RF.com
. They can be used to monitor and configure the connected target computers. SCM: This option creates a CAB file, which you can import into another SCM installation where you can edit it further. After
9%
Cgroups for resource management in Linux
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Photographer, 123RF.com
bandwidth using the tc command (see the "Bandwidth Management" box). Bandwidth Management If a process is monitored by the net_cls controller, you can assign a classID for all the processes
9%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
at the tires or adding gas. You are just a passenger letting the system manage you. A few management and monitoring tools in HPC can gather data on the state of the system, but not many. Moreover, very few
9%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
of I/O, but it is also useful to look further down the stack to see how the I/O requests appear at the various layers. One layer that is useful to monitor is the block layer, which is near the bottom
9%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
a maximum of 1,500W (20A circuit), and you could plug it into a standard 120V outlet. It had an additional graphics card, so you could plug in a monitor. This system sold for $69,000. The DGX Station has now
9%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
comfortably alongside sSMTP. Clearly, the outbound MTA needs to fulfill its obligations for the mail utility and sSMTP to function correctly; if you don't monitor your outbound mail servers, then you probably
9%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
for deploying and managing applications in the OpenShift environment. The RHC toolset includes dozens of simple commands for guiding and monitoring your OpenShift presence. Table 1 shows a sample of some
9%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
? Does the organization have appropriate measures to ensure that continuous monitoring of the network is maintained to identify any potential security breaches? Does a current and comprehensive
9%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
into your continuous integration/continuous delivery (CI/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt’s scripts come in the form of “attack files

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 97 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice