Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (821)
  • Article (155)
  • News (98)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 108 Next »

11%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
use the free Microsoft Log Parser Studio tool to monitor and analyze these event logs on Microsoft systems. Log Parser Studio [1], which is available as a free download on the Microsoft TechNet website
11%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
– a function that competitors have also had for a long time. VMware also has more to offer in terms of resource management and prioritization, or performance monitoring. Whether the feature overkill in v
11%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
. The customer simply clicks in the web interface on the button for a new database, which is configured and available shortly thereafter. The supplier ensures that redundancy and monitoring are included, as well
11%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
_anchor_tag == 1 or (#s_uri > 0 and #s_uri < 3)) 18 } You can also use Yara to monitor applications, rather than simply files. For example, using the strings command, I reviewed the contents of a database
11%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
account. You have to rely on security tools that continuously monitor for anomalous activity in the cloud and can generate security events from there. In the case of AWS, you can gather traces from Cloud
11%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
. Whereas Infra is responsible for configuring the systems, InSpec mainly takes care of monitoring. With the use of InSpec's own declarative scripting language, you store compliance rules for each system. In
11%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
with a keyboard and monitor, which is an option if the corresponding device can be controlled remotely over the Intelligent Platform Management Interface (IPMI), Dell Remote Access Controller (DRAC), Integrated
11%
Containers made simple
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Nathan Cima on Unsplash
to GitLab or GitHub, for example, and then monitor source code directories for which the CI/CD function has been enabled. If something changes there, the modified configuration is then adopted
11%
Manage guest accounts in Azure Active Directory
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jon Tyson on Unsplash
.microsoft.com/en-us/azure/active-directory/reports-monitoring/workbook-cross-tenant-access-activity
11%
Policy rulesets in cloud-native environments
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © bloomua, 123RF.com
unlimited rules, systems, and nodes and two more policy packs, including Terraform. In addition to the aforementioned security benchmarks, the product enables centralized policy monitoring and evaluates

« Previous 1 ... 89 90 91 92 93 94 95 96 97 98 99 100 101 102 ... 108 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice