Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 72 Next »

16%
Collecting and evaluating performance data over a period of time
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Sergey Nivens, 123RF.com
data as well. For example, the ksar [1] Java application, when called with the name of a logfile, root@hercules:# java -jar kSar.jar -input 'cmd:///usr/bin/sar-dwu -f /var/log/sysstat/sa02
16%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
of http://192.168.0.15:10443 . You need to use the passwords for the root user for shell access and admin for the web interface and register your account with the Endian Network for the Enterprise version
16%
News for Admins
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
 
to The Hacker News. The root cause of this issue is the fact that the OpenSSH agent stores a copy of the SSH keys in the memory (RAM of CPU), eliminating the need for entering a passphrase to log into the server
16%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
as the user name. Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
16%
Alternative container runtimes thanks to the Open Container Initiative
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Braden Collum on Unsplash
a registry to create a root filesystem for the container. With the OCI run-time tools [9], a JSON file is then created, which describes the start procedure for the container. Finally, the crio daemon calls
16%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
this problem on account of sharing a host with fewer neighbors. Single root I/O virtualization (SR-IOV) support (enhanced networking) increases storage and network I/O bandwidth, helping to minimize any noise
16%
Linux distributions for containers
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © tiero, 123RF.com
in it. The operating system is read-only and located under /usr, whereas data that should remain persistent between different OS versions, are under /var. This data is then integrated into the root file
16%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
them. Listing 1 shows the first part of the installation process for Docker Compose. Listing 1 Docker Compose Install (top) root@ip-10-78-35-6:~/mutillidae-docker# docker-compose up -d
16%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
, logs collected and processed by Fluentd or Fluent Bit can provide the contextual information needed to diagnose the root cause of the alert. If you lack some specific information in the log data (e
16%
Discovering device names
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© cbpix, 123RF.com
). Virtual functions are used when the network card supports Single Root I/O Virtualization (SR-IOV). This functionality makes it possible to split a single PCI device across multiple virtual systems without

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice