Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (394)
  • Article (116)
  • News (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 Next »

16%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
an administrator account. Configuration from the Console Accessing OSSIM from the console is easy by logging in with the root login and password you specified during the install. If you prefer, you can use
16%
AWS Automation Documents
11.04.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
a new AMI ID and contains an encrypted root EBS storage volume for extra security. A new AMI ID after copying has completed. 4 Choose whether to inject your own pre-update script
16%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
ontology, if needed, or independently extended and modified. The Tracker Ontology Reference Manual [10] gives a good overview of the Nepomuk elements. The command tracker info lets you analyze
16%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
with standard Linux commands. At the very least, you’ll be able to measure how much memory is being used minus the buffers and caches, which will include all user applications, root applications, and shared
16%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
recommended to copy the access key for client.admin from an existing OSD host to charlie. Entering scp root@daisy:/etc/ceph/keyring.admin /etc/ceph on Charlie does the trick. You can carry out all further
16%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
,10 Fierce , written by Rsnake, queries your DNS servers of the target and attempts to dump the SOA records: $ ./fierce.pl -dns  -wide -file output.txt Fierce is interesting to run in larger
16%
Sharing Linux Terminals
13.07.2022
Home »  HPC  »  Articles  » 
42:83::644 Connecting to download.rockylinux.org (download.rockylinux.org)|146.75.82.132|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 11213471744 (10G
16%
Dig Deep into Kubernetes with StatusBay
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Noel Powell, Fotolia.com
command run as root (so check the script that the command downloads and executes before trusting it implicitly by omitting the sh - after the pipe): $ curl -sfL https://get.k3s.io | sh - The website tells
16%
Automated compliance with Chef InSpec
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © pandavector, 123RF.com
and run inspec exec or use InSpec's SSH capabilities, which may be the better approach, inspec exec Example --key-files $HOME/.ssh/id_rsa --target ssh://root@10.42.0.1 especially
16%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
and now under the auspices of the Linux Foundation, now also allow direct access to physical resources without placing too much strain on remaining resources such as the CPU. Single-root I/O virtualization

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice