Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (164)
  • Article (31)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

16%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
certain things. Two reasons a script 08 # might fail are: 09 # 10 # 1) timing - A surprising number of programs (rn, ksh, zsh, telnet, 11 # etc.) and devices discard or ignore keystrokes that arrive "too
16%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
.0.0.1 mysql -h localhost -u root -p create database pdns; Listing 1 shows a quick user addition to the database and the granting of permissions. To exit from the MariaDB shell, use the quit; command
16%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
Computer Congress (31C3) in 2014 on the basis of an error in the SSH network protocol from 2002 (CVE-2002-0083). There, a single bit decided whether an attacker could gain root privileges on the machine
16%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
* argv[]) 08 { 09 long niter = 1000000000; 10 int myid; //holds process's rank id 11 double x,y; //x,y value for the random coordinate 12 int i; 13
16%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
several suspicious entries: The log entry in Listing 1, for example, shows the attacker attempting to send email-containing shell commands to the exim4 service. Listing 1: Log Entry 2011-02-06 15:08:13 H
16%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
, each LVS router node must have IP forwarding turned on in the kernel. To do this, log in as root user on both LVS routers and change the line in /etc/sysctl.conf to the following: net.ipv4.ip
16%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
     ServerAlias www.domain1.de 04 [...] 05  06  07     ServerName domain1.de 08     ServerAlias www.domain1.de 09 [...] 10  Virtual Domains
16%
Read-only File Compression with SquashFS
14.06.2017
Home »  HPC  »  Articles  » 
, mounting it requires root access (or at least sudo access). As an example, I'll take a directory (/home/laytonjb/20170502 ) on my desktop where I have stored PDFs, ZIP files, and other bits of information
16%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
.yourkolab.com 03 ServerAdmin support@yourkolab.com 04 05 DocumentRoot /usr/share/iRony/public_html/ 06 07 ErrorLog logs/caldav.yourkolab.com-error_log 08 CustomLog logs
16%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
). Listing 2 Simple Template for Packer 01 { 02 "builders": [{ 03 "type": "virtualbox-ovf", 04 "source_path": "debian7.ovf", 05 "ssh_username": "root", 06 "ssh_password": "123456", 07 "ssh

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice