Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 85 Next »

15%
Using a Bash script to mirror external monitors
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © bowie15, 123RF.com
and right. Unfortunately, my laptop has a 16:9 display with a resolution of 1,600x900 pixels. Common Denominator Some research on the topic of screen resolution reveals the root cause: the maximum
15%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
, such as the nnofagent command for listing installed flows and groups (see below), the admin user needs to be added to the sudoers file; sudo -s also works for the full-fledged root shell. API at the Wheel One
15%
An Active Directory management solution for everyone
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
set of commands directly from the web interface, from creating new users and computers, composing groups, and moving root to adjusting mail settings for Exchange servers. However, delegation of tasks
15%
The Benefit of Hybrid Drives
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Vaclav Volrab, 123RF.com
, # sync && echo "3" > \ /proc/sys/vm/drop_caches and then start the first pass: root@hercules:/Benchmark# \ /usr/bin/time -f "%F major page faults"\ ./readbench.pl... 15 major page faults If you
15%
Do You Know Juno?
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © alexskopje, 123RF.com
, Keystone is a kind of root application; without it all the wheels stand still. For Juno, the Keystone developers came up with several gimmicks, the most important being basic support for a federation model
15%
Nagios on a Rasp Pi 3 with NEMS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Chris Gendreau; Fotolia
the Pi user password, requests a username and password for use by the NEMS applications, asks you to set your time zone, resizes the root partition to take advantage of all the available micro
15%
Combining containers and OpenStack
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Dmitriy Melnikov, Fotolia.com
According to the Git repository, the roots of Magnum go back to 2014, with the first release in 2015. Magnum's original mission was split between providing Container as a Service (CaaS) and Container
15%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
port. The command footloose ssh root@ gets you into any of the created container machines where you can run any normal GNU/Linux command (Figure 5). Finally, you can clean up the created
15%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
.0.0.1 mysql -h localhost -u root -p create database pdns; Listing 1 shows a quick user addition to the database and the granting of permissions. To exit from the MariaDB shell, use the quit; command
15%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
in the root directory of the Gophish installation. Compiled packages for Linux, macOS, and Windows are available for download [3]. To get started, simply unpack and start the Gophish server. Penetration

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice