Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 85 Next »

15%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
it locally. Root privileges are needed if the location for the packages is only writable for the superuser. Table 2 shows a selection of useful extensions available from the Luarocks repository. Unfortunately
15%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
is influenced directly or indirectly by all previous levels. Multivariate analysis at the system level and the targeted use of machine learning algorithms for analysis and predictions enable efficient root cause
15%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
. Figure 1: Browser elements. When exploiting the browser, attackers generally focus on the interstice created between user mode and kernel mode. User mode is where you spend most of your time: the non-administrative/non-root
15%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
Computer Congress (31C3) in 2014 on the basis of an error in the SSH network protocol from 2002 (CVE-2002-0083). There, a single bit decided whether an attacker could gain root privileges on the machine
15%
Visualizing log and other data
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Gennadiy Poznyakov, 123RF.com
specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate (transparent) window. Figure 6: Conky
15%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
2, 69 MPI_COMM_WORLD, 70 MPI_STATUS_IGNORE); 71 } 72 } 73 74 if (myid == 0) //if root process 75
15%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
functions to run several separate virtualized OpenShift clusters on a single physical cluster. In this way, several clusters can be operated with separate root access, yet still share underlying resources
15%
A flexible, customizable, personal dashboard
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © peshkova, 123RF.com
Dashy running, you will want to customize the environment by editing the YAML-based /public/conf.yml configuration file. The file has three root attributes: pageInfo is where you store the dashboard
15%
Blocking SQL injections with GreenSQL
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maxim Kazmin, 123RF
query that triggered it. Thanks to extensive logging capabilities, you can quickly find the root cause of any problem. In the case of the Koha library system, GreenSQL had difficulties with the set
15%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
in many scenarios behind the scenes, its use at the command line has not quite taken root in the minds of many administrators. However, the learning curve is not as long and arduous as many admins might

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice