Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 71 Next »

16%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
In a test run, I used the nxFile resource. The intent is to create a text file with content on the target computer as follows: $Cred = Get-Credential -Username: "root" -Message: " Please use root"; $Opt
16%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with root
16%
macOS file recovery and security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Sgursozlu, Fotolia.com
. To open the Finder, press Cmd+Shift+G and enter the path (~\Library). Note that you have at least two Library folders: the system Library folder at the root level of your hard drive and the user Library
16%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
managed with RPort. After the VM becomes available, you will want to update with sudo apt-get update && sudo apt-get dist-upgrade and reboot. After the reboot, switch to the root account and run
16%
Monitoring Performance with sar
05.03.2014
Home »  Articles  » 
. In the simplest case, you could use a spreadsheet or gnuplot, but a number of specialized programs evaluate sar data as well. For example, the ksar Java application, when called with the name of a logfile, root
16%
Logging with systemd
18.02.2014
Home »  Articles  » 
system messages are reserved for root or members of the adm group. For an overview of all log messages, even from rotated logs, you simply call journalctl . The output and format are almost identical
16%
Shell in a Browser
15.03.2012
Home »  Articles  » 
 
install command with root privileges. The call sets up the program in /usr/local . In contrast to PHP Shell, Shell In A Box includes its own web server that listens on port 4200 by default. It has several
16%
Virsh Libvert Tool
10.05.2012
Home »  Articles  » 
 
virsh version . If you see an error message, you need to become root and try your luck again. If virsh tells you something about a connection error, you need to enable the libvirtd . Most distributions
16%
Listing 1
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
Listing 1: Output of Installing numactl into VNFS [root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install numactl Loaded plugins: fastestmirror, refresh-packagekit, security
16%
Listing 2
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
Listing 2: Output of Installing hwloc into VNFS [root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install hwloc Loaded plugins: fastestmirror, refresh-packagekit, security Loading

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice