Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (344)
  • Article (73)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 42 Next »

15%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
/log/syslog. su root syslog # keep 4 weeks worth of backlogs rotate 4 # create new (empty) logfiles after rotating old ones create # use date as a suffix of the rotated file #dateext # uncomment this if you want
15%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
.linux-magazin.de; 04 05 root /var/www/www.linux-magazin.de; 06 index index.html index.htm; 07 08 # Let's Encrypt Challenge 09 # 10 location ~ /.well-known { 11 allow all; 12 } 13 14
15%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
). Figure 2: Configuring a static IP address on a VPN server. Other prerequisites include setting a root password, running updates on the Ubuntu virtual machine, installing SSH, temporarily disabling
15%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
group => 'root', 11 mode => '0644', 12 source => 'puppet:///modules/profile/systemd/puppet-sshd-watch.service', 13 notify => Exec['systemd-reload'], 14 } 15 16 file { $path_unit: 17
15%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
the wrapper script, you need to move these scripts to a different directory, which in this example I choose to be /etc/cluster_tools . First, as root, create this new directory and move the module files there
14%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
flags [5]. As soon as DNF is installed, you should update root's .profile (or the .kshrc file, or both) to update the $PATH environment variable to include the location of the DNF (and other OSS
14%
Listing 4
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
Listing 4: Installing ganglia-metad into the Master Node [root@test1 RPMS]# yum install ganglia-gmetad-3.4.0-1.el6.i686.rpm Loaded plugins: fastestmirror, refresh-packagekit, security Loading
14%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
--region eu-west-1 05 --nodegroup-name chrisbinnie-eks-nodes 06 --node-type t3.medium 07 --nodes 2 08 --nodes-min 1 09 --nodes-max 2 10 --ssh-access 11 --ssh-public-key /root/eks-ssh.pub 12
14%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
can be almost anything, such as images, tables, graphics, or documents. As with groups, they also have metadata. Every HDF5 file contains a “root” group. This group can contain other groups or datasets
14%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Openwall's website. John the Ripper is a command-line utility that does not require administrative or root privileges to run against a password hash file. However, you will need administrative privileges

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice