Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (444)
  • Article (129)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 58 Next »

14%
Troubleshooting SELinux
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Sapsiwai, Fotolia
.250:20): avc: denied { getattr } for pid=2603 comm="httpd" path="/docroot" dev=sda6 ino=24481 scontext=user_u:system_r:httpd_t:s0 tcontext=user_u:object_r:default_t:s0 tclass=dir The messages you
14%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Rafal Olechowski, 123RF.com
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb3 14 22: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
14%
Kibana Meets Kubernetes
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © wbraga, 123RF.com
-of-concept functionality. Three Is the Magic Number I'm going to use the excellent K3s to build my Kubernetes cluster. For instructions on how to install K3s, check out the "Teeny, Tiny" section in my article on Status
14%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1
14%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, and a writable SUID file would essentially allow the user to execute any commands the owner of the file could execute simply by modifying the file. find / -o -group `id -g` -perm \  -g=w -perm -u=s -o -perm -o
14%
Modern Fortran for today and tomorrow
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © homestudio, 123RF.com
+ X3 + 1 X4 + X5 + X6 ----------------------------- 11111111112222222222 12345678901234567890123456789 By default, F77 defines variables starting with (upper- or lowercase) i, j
14%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.00 1.18 0.70 1.65 8
14%
Five special distros for system and network admins
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Christos Georghiou, 123RF.com
Figure 3: Midnight Commander provides excellent services for file and folder management. Grml Grml [6] from Graz, Austria, is one of the veterans among Linux distributions for maintenance and rescue
14%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
." The new lineup consists of the AX41 and AX41-NVME, which are based on the Ryzen 5 3600 CPU (with 6 cores and 12 threads), and can be combined with either two 2TB HDDs or two 512GB NVMe SSDs. Each of those
14%
Finally: Java 9
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Krockenmitte, photocase.com
390x port from SAP and the Red Hat-contributed Linux/AAarch64 port for the 64-bit ARM platform. Unicode version 7 is now included instead of 6.2, and Java 9 can load TIFF images, support SHA-3, and more

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice