Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (628)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 84 Next »

15%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
on the same host that later hosts Confluence, Jira, and GitLab, so it is an all-in-one (AiO) setup. Because Ansible connects via SSH, but ideally not as the root user, a separate user account is required
15%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
for the error message could be that current Linux distributions do not have Let's Encrypt's root certificate installed in their keychains – resorting to standard tools such as the Docker daemon (via the crypto
15%
Setting up MariaDB replication with the help of XtraBackup
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Kran Kanthawong, 123RF.com
_upgrade with --force or -f. Beware: The master has also taken on the root password: sudo mysql_upgrade -f -u root -p <root_password_for_master> In the data directory you will find the human-readable xtrabackup
15%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
is based on the fog library [4]. Its configuration is located in the root directory of the user responsible for provisioning; to create it, you need to type touch ~/.fog. Fog will accept a variety different
15%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
the pool master role, you can check the Pool master property in the host's General properties: xe patch-upload -s -u root -pw file-name=/XS62E002.xsupdate The command
15%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Oksana Bratanova, 123RF.com
the MySQL root password with: mysqladmin -u root password Now, you can log in to MySQL and create the ovd database. mysql -u root -p -e 'create database ovd' The next step is to run yum
15%
Changes in Exchange Server 2013
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Alessandro Russo, 123RF.com
automatically trust internal certification authorities. If you use a third-party certification authority, you must manually add the CA certificate to your Trusted Root Certification Authorities if it is not yet
15%
Clustering with the Nutanix Community Edition
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Beau Runsten on Unsplash
approaches lead to the CVM and hypervisor consoles. Table 1 provides an overview of the accounts you can use to access the system, including the root login name for accessing the console
15%
phpVirtualBox and RemoteBox compared
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Renjith-Krishnan, 123RF.com
to install it. You can just unpack the ZIP archive of the current 4.2.2 version in the document root of the web server to extract the files. When you download phpVirtualBox, make sure that the selected version
15%
More than password protection, htaccess has you covered
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitry Bruskov, 123RF.com
create your directory structure carefully. First, it's important to place the password file in a location away from your web root, so it would take a relatively serious server compromise involving local

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice