Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (9)
  • News (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 20 Next »

16%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
on Mac OS X and OpenBSD. To check out my Ubuntu 11.04 laptop's /bin caching status, I enter: $ ./vmtouch /bin Vmtouch crawled the files in /bin and reported that about half of the memory pages
16%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
ubiquitous that even my laptop can act as a VMware or Xen host. I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
16%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
swapping well, and a laptop might hibernate (suspending to disk leverages swap area storage). On servers, swap mostly ensures that intermittent conditions will not cause a crash, as performance constraints
16%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
of when we imagine a traditional desktop computer. But, when contemporary analysts write and speak about the Post-PC Era, they're talking about desktop computers and standard laptops as well. By my
16%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity
16%
Using AppLocker to block applications on networks
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Jennifer Huls, 123RF.com
and even individual DLL files in special use cases, including the ability to distinguish between program and DLL versions. AppLocker can also create automatic policies and monitor specific directories
16%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
, a laptop and an extra cable tester will be more helpful. This mix of equipment, however, is more unwieldy, heavier, more complex, and less robust than a specialized network tester. In contrast, Lan
16%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
when something goes wrong, the software you can use with a smartphone to fix it, and other options you have to control your machines from a distance. Monitoring and Alerts Several software options
16%
Tracing applications with OProfile and SystemTap
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© boing, Photocase.com
the value for all the available CPUs; if you set 0x40, you get the value only for the CPU actually running the OProfile process. The command in Listing 2 monitors a specific event. Listing 2
16%
Microsoft Active Directory Rights Management Services
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © vska, 123RF.com
. Logging AD RMS writes important information to the application, security, system, and AD RMS event logs on the AD RMS server. Some specific events that are critical to monitor are shown in Table 1

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice