MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
New Architect
May 2002
Brian Wilson
Manage Distributed Apache Web Servers Covalent's new Enterprise Ready Server isn't just another commercial Web server offering. It's a complete management system designed to handle configuration, monitoring, and log file management for a distributed network of Apache Web servers... mark for My Articles similar articles
Linux Journal
October 1, 2002
Mick Bauer
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. mark for My Articles similar articles
Linux Journal
July 2000
Daniel Allen
Product Review Understudy is a software-based server clustering utility that implements load balancing and failover protection for Linux (Red Hat, Debian and Slackware), Solaris, Cobalt, FreeBSD and Windows NT. mark for My Articles similar articles
New Architect
November 2002
Al Williams
Server Sandboxes Dedicated hosting without the hassle: deploy a single OS kernel on a single machine, but divide the kernel's system resources into multiple "lite" virtual servers, or sandboxes. mark for My Articles similar articles
Linux Journal
July 1, 2007
Richard Bullington-McGuire
Mambo Exploit Blocked by SELinux A real-world case where Security-Enhanced Linux proved its worth. SELinux prevented the attacker from executing the second stage of the attack, possibly preventing a root compromise. mark for My Articles similar articles
Linux Journal
May 1, 2000
Jacek Artymiak
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. mark for My Articles similar articles
Linux Journal
September 1, 2007
Jeramiah Bowling
Fedora Directory Server: the Evolution of Linux Authentication FDS seems evolutionary, not revolutionary. It does not change the way in which LDAP operates at a fundamental level. What it does do is take the complex task of administering LDAP and makes it easier while extending normally commercial features. mark for My Articles similar articles
Macworld
December 2001
Stephan Somogyi
Web Log Analyzers Tools to make sense of your MacOS web server traffic... mark for My Articles similar articles
Linux Journal
September 30, 2006
Dave Taylor
Work the Shell - Analyzing Log Files Redux Many ISPs have a maximum allocation for your monthly bandwidth, so it's important to be able to figure out how much data you've sent. If you want an easy way to calculate the amount of data transferred from a log file, you can always look awk-ward. mark for My Articles similar articles
Linux Journal
September 30, 2006
Albert Martorell
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. mark for My Articles similar articles
New Architect
December 2002
Lee Schlesinger
NetIQ WebTrends Reporting Center 5.0, Enterprise Edition You can get free Web server log analysis tools, so why pay tens of thousands of dollars for NetIQ Corp.'s WebTrends Reporting Center? Because it can help you learn lessons from your logs that more than pay back its high price. mark for My Articles similar articles
Linux Journal
January 1, 2003
Adam Lazur
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. mark for My Articles similar articles
Linux Journal
March 2000
Tristan Greaves
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. mark for My Articles similar articles
PC Magazine
August 31, 2005
Kaven & Rupley
D.I.Y. Linux Here are step-by-step instructions for installing and customizing your own Linux system. mark for My Articles similar articles
JavaWorld
December 2001
Sanjay Dahiya
Cut down on logging errors with Jylog This article introduces Jylog, a new approach to error-free and flexible event logging. Based on the Java Platform Debugger Architecture, Jylog completely separates logging from coding. Learn how Jylog and its underlying technology, JPDA, work, and how you can use them... mark for My Articles similar articles
Linux Journal
January 1, 2007
Dave Taylor
Work the Shell - How Do People Find You on Google? Getting back to Apache log analysis by ending with a cliffhanger. mark for My Articles similar articles
Linux Journal
April 28, 2006
Kevin Farnham
The Ultimate Linux/Windows System Use cross-platform applications and shared data for the ultimate Linux/Windows system. mark for My Articles similar articles
Linux Journal
March 2001
Ian Spare
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... mark for My Articles similar articles
Linux Journal
September 1, 2002
Cal Erickson
Memory Leak Detection in Embedded Systems The author discusses mtrace, dmalloc and memwatch -- three easy-to-use tools that find most application program errors. mark for My Articles similar articles
Linux Journal
December 2000
Michael O'Brien
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. mark for My Articles similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles similar articles
Linux Journal
July 2000
Michael A. Schwarz
Take Command: The System Logging Daemons, syslogd and klog Take command of your log files by learning to handle those pesky logging daemons. mark for My Articles similar articles
PC World
September 2005
Scott Dunn
Windows' Command Line Puts You in Control Text commands can make quick work of many Windows tasks; plus, a free file-copy utility. mark for My Articles similar articles
Financial Advisor
March 2012
Joel P. Bruckenstein
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. mark for My Articles similar articles
PC Magazine
November 16, 2004
Larry J. Seltzer
Limited User Accounts Here's a clever way to bolster Windows PC security--with some catches. mark for My Articles similar articles
PC Magazine
April 4, 2006
Neil J. Rubenking
Safe Eyes 2006 Safe Eyes 2006 monitors and controls what your kids do online, alerting you to violations via e-mail, text, or phone. mark for My Articles similar articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles similar articles
Search Engine Watch
May 6, 2008
Mark Jackson
Conducting a Redirect Audit on Your Web Site - Part 2 Knowing which pages on your site are returning errors, and which ones are being redirected can help you pinpoint issues to address. Performing a redirect audit can help you get to the bottom of those problems. mark for My Articles similar articles
JavaWorld
September 2001
Sunil Kumar & Nitin Nanda
Log it or lose it How to enable a Java application to log messages to the NT Event Log... mark for My Articles similar articles
InternetNews
August 20, 2010
LogLogic Preps New Approach to Log Wrangling LogLogic bets its solution for collecting WAN log file data is headed for standardization. Not everyone agrees, however. mark for My Articles similar articles
Linux Journal
February 1, 2007
Jon Hall
Beachhead - Beneath the Surface Don't forget the modular command-line power of Linux. mark for My Articles similar articles
InternetNews
June 22, 2010
LogRhythm Mining Log Files for Better Security Security information and event management vendor LogRhythm updates its platform to offer enterprises a new path to security with added visibility into their log files. mark for My Articles similar articles
Macworld
December 2003
Yuval Kossovsky
Panther Server Part II A look at the Server Admin tool mark for My Articles similar articles
JavaWorld
April 2001
Nate Sammons
Robust event logging with Syslog Because event logging is often an afterthought, Java developers often ignore this task while programming. However, logging allows developers to instrument their code so the operations staff can deal with any problems that arise... mark for My Articles similar articles
Macworld
February 2001
Mel Beckman
FunnelWeb 4.0 Web-Log Analyzer Makes Gorgeous Graphs of Your Data... mark for My Articles similar articles
Linux Journal
August 2000
Jon Valesh
Product Review ImageStream IS Gateway and Rebel Routers: heavy-hitting performance, lightweight price. mark for My Articles similar articles
PC World
May 2006
Scott Dunn
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... mark for My Articles similar articles
PC Magazine
May 3, 2006
Edward Mendelson
Buying Guide: Online Collaboration Services Online collaboration tools let you and your coworkers log on to a Web site to share all the information you normally access on desktop computers. Our expert can help you balance the pros and cons involved. mark for My Articles similar articles
Unix Insider
January 2001
Cameron Laird & Kathryn Soraiz
Scripted wrappers for legacy applications, Part 3 The authors offer some closing comments on interprocess communication (IPC) and focus on ways to alloy scripting languages and systems languages, such as C, in single-process executables... mark for My Articles similar articles
CIO
April 15, 2006
Matt Villano
A Better Way to Search for Trouble Splunk is a system log search tool that empowers system administrators to scrutinize their network performance logs more easily. mark for My Articles similar articles
PC Magazine
June 6, 2007
Neil J. Rubenking
Safe Eyes 5.0 Safe Eyes 5.0 protects kids online, includes remote notification and management, and resists hacking. mark for My Articles similar articles
T.H.E. Journal
August 2004
Clean Slate v3.0 The Fortres Grand Corp. application protects individual computers from any changes to their standard configuration. mark for My Articles similar articles