Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (133)
  • News (75)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 Next »

9%
Linux and Windows client management with opsi
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © alexutemov, 123RF.com
: Lets you monitor your opsi installation with Nagios or a descendant of Nagios, such as Icinga. The module can keep an eye on the opsi server, clients, and software rollouts. WAN Extension: Allows
9%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
at level 3. To do this, each VLAN must have a connection to a router. VLANs do not protect networks against spying or sniffing, although they can be monitored like switched networks using data analyzers (e
9%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Tom Baker, 123RF.com
types and monitors every system call to the malicious software running inside a virtual machine. It observes all files that are created, deleted, or loaded from external sources by the malware; records
9%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
, isolated access to your filesystems, and monitored network traffic. In the container context, these functions include Nspawnd and Portabled. When deployed correctly, they draw on features from
9%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
on the Intel NUC. Insert the two USB sticks into the corresponding server ports and switch the server on. You can now follow the installation process on the monitor connected to the NUC and, depending
9%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
, and improve productivity. For example, an application can pull calendar information to schedule meetings, manage cloud storage by interacting with OneDrive, or monitor organizational insights. It supports
9%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
of warning is in order: The work required in the K8s universe includes monitoring workloads, both those of K8s itself and the services running on it. Observability is massively important. Providers know this
9%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
Quagga to a monitoring system via SNMP traps or to analyze the details of the Zebra protocol [11]. Infos Quagga project: http://www.nongnu.org/quagga/ Zebra routing daemon: http
9%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
systems must be scaled up, monitoring must keep up with an ever increasing number of checks and metrics, and the admin might have a long-hedged wish to introduce a configuration management utility like
9%
Better Active Directory with Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Sattapapan Tratong, 123RF.com
is the IP Address Management (IPAM) server, which monitors and centrally manages the DHCP and DNS services. Installation is done as a server role. Remote Management Administrators can access servers

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 85 86 87 88 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice