Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 72 Next »

16%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
that targeted Windows systems in 2015. "OSX/MaMi isn't particular advanced – but does alter infected systems in rather nasty and persistent ways. By installing a new root certificate and hijacking the DNS
16%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
akin to invoking sync [9] before renaming over an existing file. I can validate this result by running a few tests in the test instance, after remounting the root partition with modified options
16%
A Bash-based monitoring tool
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © citalliance, 123RF.com
usage plots show used, cached, and free memory usage, as well as swap space. To the right of the memory charts is a set of plots for disk usage. Figure 1 shows three disks: root , home_rysnc , and home
16%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
, you can create a share with New-SmbShare, then map the share with: > New-PsDrive -Root \\server\Release -name Y -PsProvider FileSystem -persist and subsequently start a simple copying process. Or use
16%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
to take advantage of the number of cores is to run multiple cp commands at the same time, either on specific files or specific subtrees (start at the lowest branch and work upward to root). This isn't too
16%
Password management with FreeIPA
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Marqs, photocase.com
Password for tscherf@EXAMPLE.COM: [root@ipa01 ~]# ipa vault-retrieve team-keys --shared --out my-team-keys.txt --password-file passwd.txt Asymmetric keys can be used instead of simple passwords
16%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
save each private key under the root.pem name. By default, Rundeck stores the keys unencrypted in the filesystem (under /var/lib/rundeck/var/storage/) or in the database, but a plugin lets you encrypt
16%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
the load on the system, what’s running on the system, and how to stop a process, which leads to some understanding of what processes are run by root and what processes are run by users. Again, Windows
16%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
/local/Modules/src . As root, run the following commands: % cd /usr/local % mkdir Modules % cd Modules % mkdir src % cp modules-3.2.6.tar.gz /usr/local/Modules/src % gunzip -c modules-3.2.6.tar.gz | tar xvf - % cd modules-3
16%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
for authentication in remote login scenarios on Linux servers. Personal, non-administrative identifiers in combination with the use of sudo on Linux, or UAC on Windows, make shared knowledge of the root

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice