Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 93 Next »

24%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
that targeted Windows systems in 2015. "OSX/MaMi isn't particular advanced – but does alter infected systems in rather nasty and persistent ways. By installing a new root certificate and hijacking the DNS
24%
Filesystem Murder Mystery
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Lucy Baldwin, 123RF.com
akin to invoking sync [9] before renaming over an existing file. I can validate this result by running a few tests in the test instance, after remounting the root partition with modified options
24%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
, you can create a share with New-SmbShare, then map the share with: > New-PsDrive -Root \\server\Release -name Y -PsProvider FileSystem -persist and subsequently start a simple copying process. Or use
24%
Password management with FreeIPA
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Marqs, photocase.com
Password for tscherf@EXAMPLE.COM: [root@ipa01 ~]# ipa vault-retrieve team-keys --shared --out my-team-keys.txt --password-file passwd.txt Asymmetric keys can be used instead of simple passwords
24%
Configuration management and automation
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Valerijs Kostreckis, 123RF.com
save each private key under the root.pem name. By default, Rundeck stores the keys unencrypted in the filesystem (under /var/lib/rundeck/var/storage/) or in the database, but a plugin lets you encrypt
24%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
the load on the system, what’s running on the system, and how to stop a process, which leads to some understanding of what processes are run by root and what processes are run by users. Again, Windows
24%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
/local/Modules/src . As root, run the following commands: % cd /usr/local % mkdir Modules % cd Modules % mkdir src % cp modules-3.2.6.tar.gz /usr/local/Modules/src % gunzip -c modules-3.2.6.tar.gz | tar xvf - % cd modules-3
24%
Centralized Password Management
06.08.2013
Home »  Articles  » 
 
for authentication in remote login scenarios on Linux servers. Personal, non-administrative identifiers in combination with the use of sudo on Linux, or UAC on Windows, make shared knowledge of the root
24%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
, to the Eucalyptus user on each of the nodes. Once this is done, go back to the cloud controller and from the root prompt, type: sudo - u eucalyptus ssh- copy- id - i /var/lib/eucalyptus/.ssh/id_rsa.pub eucalyptus
24%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
application. The web server copies the script from the listing (with root privileges) to the /etc/apache2/site-available/rconf path. The command sudo a2ensite binds it into the web server's configuration; sudo

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice