Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 72 Next »

16%
Visualizing kernel scheduling
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 36clicks, 123RF.com
to the location where the repo was cloned and install with Yarn: cd schedviz yarn install Once it has finished, navigate to the root of the repo folder and start up your server: yarn bazel run server
16%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
Grafana opens up this door. In this article, I go into detail about Loki and describe which functions are available and which are missing. The Roots of Loki:Prometheus and Cortex If you follow Loki back
16%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
peculiarities await. All files below /mnt/c belong to root. Changes to user rights with chmod and chown are ineffective. This handicap does not seriously disrupt usability, however, because you can freely create
16%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
In a test run, I used the nxFile resource. The intent is to create a text file with content on the target computer as follows: $Cred = Get-Credential -Username: "root" -Message: " Please use root"; $Opt
16%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with root
16%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
. To open the Finder, press Cmd+Shift+G and enter the path (~\Library). Note that you have at least two Library folders: the system Library folder at the root level of your hard drive and the user Library
16%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
managed with RPort. After the VM becomes available, you will want to update with sudo apt-get update && sudo apt-get dist-upgrade and reboot. After the reboot, switch to the root account and run
16%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
need to allow at least 1GB of RAM in single-process mode for the sensor component, which also requires root privileges. The server component has no specific requirements, and the install process
16%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
. In the simplest case, you could use a spreadsheet or gnuplot, but a number of specialized programs evaluate sar data as well. For example, the ksar Java application, when called with the name of a logfile, root
16%
Logging with systemd
18.02.2014
Home »  Articles  » 
system messages are reserved for root or members of the adm group. For an overview of all log messages, even from rotated logs, you simply call journalctl . The output and format are almost identical

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice