Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 85 Next »

15%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
that targeted Windows systems in 2015. "OSX/MaMi isn't particular advanced – but does alter infected systems in rather nasty and persistent ways. By installing a new root certificate and hijacking the DNS
15%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
akin to invoking sync [9] before renaming over an existing file. I can validate this result by running a few tests in the test instance, after remounting the root partition with modified options
15%
A Bash-based monitoring tool
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © citalliance, 123RF.com
usage plots show used, cached, and free memory usage, as well as swap space. To the right of the memory charts is a set of plots for disk usage. Figure 1 shows three disks: root , home_rysnc , and home
15%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
, you can create a share with New-SmbShare, then map the share with: > New-PsDrive -Root \\server\Release -name Y -PsProvider FileSystem -persist and subsequently start a simple copying process. Or use
15%
Moving your data – It's not always pretty
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
digifuture, 123RF
to take advantage of the number of cores is to run multiple cp commands at the same time, either on specific files or specific subtrees (start at the lowest branch and work upward to root). This isn't too
15%
Password management with FreeIPA
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Marqs, photocase.com
Password for tscherf@EXAMPLE.COM: [root@ipa01 ~]# ipa vault-retrieve team-keys --shared --out my-team-keys.txt --password-file passwd.txt Asymmetric keys can be used instead of simple passwords
15%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
save each private key under the root.pem name. By default, Rundeck stores the keys unencrypted in the filesystem (under /var/lib/rundeck/var/storage/) or in the database, but a plugin lets you encrypt
15%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
the load on the system, what’s running on the system, and how to stop a process, which leads to some understanding of what processes are run by root and what processes are run by users. Again, Windows
15%
Hyper-V 3.0 in Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Nico Smit, 123RF.com
to the network adapter, among other things. Single-Root I/O Virtualization (SR-IOV) is also new in Hyper-V. Under this specification, Hyper-V can also use hardware features of network adapters. To this end
15%
Successful automatic service detection
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dmitriy Denysov, 123RF.com
to find out more details about specific services. Listing 1 Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice