Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (151)
  • Article (8)
  • News (8)
Keywords

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »

11%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
managed observability platform designed specifically for Rancher-managed Kubernetes clusters. The platform lets enterprises "monitor mission-critical workloads in Rancher-managed Kubernetes clusters across
11%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
, essentially creating a full-blown monitoring system that is scalable, versatile, and more informational. For more information, see: https
11%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3
11%
Four solutions for Prometheus long-term storage
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sidewaypics, 123RF.com
-hardened Prometheus admins will probably disagree at this point because, as good as Prometheus might be for collecting basic data for trending and supporting monitoring on the basis of individual events, the work
11%
Linux small business servers compared
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Umzugskartons, fotolia.
to an extensive battery of tools for deployment, virtualization, backup, and monitoring, as well as a hierarchical team of staff to care for it. If, for example, you forget about theoretical ideals
11%
Visualize data throughput with SMBTA
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Qi Feng, 123RF.com
developed by Tobias Oetiker, has become the quasi-standard tool for storing network monitoring data. It allows administrators to store and visualize acquired data over time. RRDtool is now released under
11%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
manual effort. If these activities are not monitored, the rogue router establishes itself as the IPv6 default gateway. Additionally, it can use certain flags in the RA to control the DNS configurations
11%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
: Multi-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto
11%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
for the first time, it downloads the available block and reputation lists to the local system, which you can monitor easily in a terminal window. After launching the server, you can access Maltrail in the web
11%
Port-based access protection with NAP and 802.1X
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© PAnja Kaiser, Fotolia.com
-based access monitoring on the switch. Now, you need to specify for each switch port you will be using that it is an access port with 802.1X port monitoring – as you can see for the Fastethernet0/1 port

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice