Similar Articles |
|
New Architect May 2002 Brian Wilson |
Manage Distributed Apache Web Servers Covalent's new Enterprise Ready Server isn't just another commercial Web server offering. It's a complete management system designed to handle configuration, monitoring, and log file management for a distributed network of Apache Web servers... |
Linux Journal October 1, 2002 Mick Bauer |
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. |
Linux Journal July 2000 Daniel Allen |
Product Review Understudy is a software-based server clustering utility that implements load balancing and failover protection for Linux (Red Hat, Debian and Slackware), Solaris, Cobalt, FreeBSD and Windows NT. |
New Architect November 2002 Al Williams |
Server Sandboxes Dedicated hosting without the hassle: deploy a single OS kernel on a single machine, but divide the kernel's system resources into multiple "lite" virtual servers, or sandboxes. |
Linux Journal July 1, 2007 Richard Bullington-McGuire |
Mambo Exploit Blocked by SELinux A real-world case where Security-Enhanced Linux proved its worth. SELinux prevented the attacker from executing the second stage of the attack, possibly preventing a root compromise. |
Linux Journal May 1, 2000 Jacek Artymiak |
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. |
Linux Journal September 1, 2007 Jeramiah Bowling |
Fedora Directory Server: the Evolution of Linux Authentication FDS seems evolutionary, not revolutionary. It does not change the way in which LDAP operates at a fundamental level. What it does do is take the complex task of administering LDAP and makes it easier while extending normally commercial features. |
Macworld December 2001 Stephan Somogyi |
Web Log Analyzers Tools to make sense of your MacOS web server traffic... |
Linux Journal September 30, 2006 Dave Taylor |
Work the Shell - Analyzing Log Files Redux Many ISPs have a maximum allocation for your monthly bandwidth, so it's important to be able to figure out how much data you've sent. If you want an easy way to calculate the amount of data transferred from a log file, you can always look awk-ward. |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
New Architect December 2002 Lee Schlesinger |
NetIQ WebTrends Reporting Center 5.0, Enterprise Edition You can get free Web server log analysis tools, so why pay tens of thousands of dollars for NetIQ Corp.'s WebTrends Reporting Center? Because it can help you learn lessons from your logs that more than pay back its high price. |
Linux Journal January 1, 2003 Adam Lazur |
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
PC Magazine August 31, 2005 Kaven & Rupley |
D.I.Y. Linux Here are step-by-step instructions for installing and customizing your own Linux system. |
JavaWorld December 2001 Sanjay Dahiya |
Cut down on logging errors with Jylog This article introduces Jylog, a new approach to error-free and flexible event logging. Based on the Java Platform Debugger Architecture, Jylog completely separates logging from coding. Learn how Jylog and its underlying technology, JPDA, work, and how you can use them... |
Linux Journal January 1, 2007 Dave Taylor |
Work the Shell - How Do People Find You on Google? Getting back to Apache log analysis by ending with a cliffhanger. |
Linux Journal April 28, 2006 Kevin Farnham |
The Ultimate Linux/Windows System Use cross-platform applications and shared data for the ultimate Linux/Windows system. |
Linux Journal March 2001 Ian Spare |
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... |
Linux Journal September 1, 2002 Cal Erickson |
Memory Leak Detection in Embedded Systems The author discusses mtrace, dmalloc and memwatch -- three easy-to-use tools that find most application program errors. |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
RootPrompt.org May 17, 2000 Lance Spitzner |
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. |
Linux Journal July 2000 Michael A. Schwarz |
Take Command: The System Logging Daemons, syslogd and klog Take command of your log files by learning to handle those pesky logging daemons. |
PC World September 2005 Scott Dunn |
Windows' Command Line Puts You in Control Text commands can make quick work of many Windows tasks; plus, a free file-copy utility. |
Financial Advisor March 2012 Joel P. Bruckenstein |
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. |
PC Magazine November 16, 2004 Larry J. Seltzer |
Limited User Accounts Here's a clever way to bolster Windows PC security--with some catches. |
PC Magazine April 4, 2006 Neil J. Rubenking |
Safe Eyes 2006 Safe Eyes 2006 monitors and controls what your kids do online, alerting you to violations via e-mail, text, or phone. |
PC Magazine June 13, 2011 Eric Griffith |
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. |
Search Engine Watch May 6, 2008 Mark Jackson |
Conducting a Redirect Audit on Your Web Site - Part 2 Knowing which pages on your site are returning errors, and which ones are being redirected can help you pinpoint issues to address. Performing a redirect audit can help you get to the bottom of those problems. |
JavaWorld September 2001 Sunil Kumar & Nitin Nanda |
Log it or lose it How to enable a Java application to log messages to the NT Event Log... |
InternetNews August 20, 2010 |
LogLogic Preps New Approach to Log Wrangling LogLogic bets its solution for collecting WAN log file data is headed for standardization. Not everyone agrees, however. |
Linux Journal February 1, 2007 Jon Hall |
Beachhead - Beneath the Surface Don't forget the modular command-line power of Linux. |
InternetNews June 22, 2010 |
LogRhythm Mining Log Files for Better Security Security information and event management vendor LogRhythm updates its platform to offer enterprises a new path to security with added visibility into their log files. |
Macworld December 2003 Yuval Kossovsky |
Panther Server Part II A look at the Server Admin tool |
JavaWorld April 2001 Nate Sammons |
Robust event logging with Syslog Because event logging is often an afterthought, Java developers often ignore this task while programming. However, logging allows developers to instrument their code so the operations staff can deal with any problems that arise... |
Macworld February 2001 Mel Beckman |
FunnelWeb 4.0 Web-Log Analyzer Makes Gorgeous Graphs of Your Data... |
Linux Journal August 2000 Jon Valesh |
Product Review ImageStream IS Gateway and Rebel Routers: heavy-hitting performance, lightweight price. |
PC World May 2006 Scott Dunn |
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... |
PC Magazine May 3, 2006 Edward Mendelson |
Buying Guide: Online Collaboration Services Online collaboration tools let you and your coworkers log on to a Web site to share all the information you normally access on desktop computers. Our expert can help you balance the pros and cons involved. |
Unix Insider January 2001 Cameron Laird & Kathryn Soraiz |
Scripted wrappers for legacy applications, Part 3 The authors offer some closing comments on interprocess communication (IPC) and focus on ways to alloy scripting languages and systems languages, such as C, in single-process executables... |
CIO April 15, 2006 Matt Villano |
A Better Way to Search for Trouble Splunk is a system log search tool that empowers system administrators to scrutinize their network performance logs more easily. |
PC Magazine June 6, 2007 Neil J. Rubenking |
Safe Eyes 5.0 Safe Eyes 5.0 protects kids online, includes remote notification and management, and resists hacking. |
T.H.E. Journal August 2004 |
Clean Slate v3.0 The Fortres Grand Corp. application protects individual computers from any changes to their standard configuration. |