Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (283)
  • Article (76)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 37 Next »

15%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
edit podman.socket 08 mkdir -p /etc/systemd/system/podman.socket.d 09 cat >/etc/systemd/system/podman.socket.d/override.conf 10 [Socket] 11 SocketMode=0660 12 SocketUser=root 13 Socket
15%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
if you walk away from it briefly. Test Rooted Devices Has the vendor operating system been replaced? Does that mean the inherent protections are no longer being used effectively
15%
Exploring the filesystem that knows everything
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
. A wealth of details about your processes is available, although security stops you from accessing other users' processes if you are not root. The Linux kernel also provides lots of additional system
15%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
command: $ cat /var/lib/mysql/testDB/testTB.ibd | head -n 20 The command output will generate plaintext information containing raw data stored in the corresponding database table. Key Management
15%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
15%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
S %CPU %MEM TIME+ COMMAND 3294 root 20 0 748016 4760 988 S 13.3 0.1 0:01.19 fio 3155 root 20 0 0 0 0 D 2.3 0.0 0:14.55 md0_resync 18 root 20
15%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
nodes, and make sure to do this as a user and not as root. 3. To make life easier, use shared storage between the controller and the compute nodes. 4. Make sure the UIDs and GIDs are consistent
15%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
. Make sure passwordless SSH is working between the control node and all compute nodes, and make sure to do this as a user and not as root. To make life easier, use shared storage between the controller
15%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
can specify a number along with the -n option to make tail print the specified number of lines starting from the end. For instance, tail -n 20 /var/log/auth.log will print the last 20 lines. The idea
15%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
option: Figure 2: The initial situation: a hard disk with a root and a swap partition. raider -R1 You don't need to state the disks/partitions here

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice