search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(475)
Article
(161)
News
(41)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
36
37
38
39
...
68
Next »
27%
Desired State Configuration for Linux
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
In a test run, I used the nxFile resource. The intent is to create a text file with content on the target computer as follows: $Cred = Get-Credential -Username: "
root
" -Message: " Please use
root
"; $Opt
27%
Digital signatures in package management
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with
root
27%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
peculiarities await. All files below /mnt/c belong to
root
. Changes to user rights with chmod and chown are ineffective. This handicap does not seriously disrupt usability, however, because you can freely create
27%
User File Recovery
19.04.2018
Home
»
HPC
»
Articles
»
a hierarchy recursively, skip any directory that is on a filesystem different from that of the corresponding command-line argument --no-preserve-
root
Do not treat “/” specially --preserve-
root
27%
Just-in-time administration in Active Directory
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
attributes, such as group memberships (memberOf), have an expiry stamp. In this way, your role-based group construct can be used for permanent memberships of your
root
administrators and temporary memberships
27%
Assess USB performance while exploring storage caching
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
@cybertron:~$ lsusb -t /: Bus 02.Port 1: Dev 1, Class=
root
_hub, Driver=xhci_hcd/6p, 5000M |__ Port 1: Dev 6, If 0, Class=Mass Storage, Driver=usb-storage, 5000M /: Bus 01.Port 1: Dev 1, Class=
root
_hub, Driver
27%
Central logging for Kubernetes users
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
Grafana opens up this door. In this article, I go into detail about Loki and describe which functions are available and which are missing. The
Roots
of Loki:Prometheus and Cortex If you follow Loki back
27%
Visualizing kernel scheduling
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
to the location where the repo was cloned and install with Yarn: cd schedviz yarn install Once it has finished, navigate to the
root
of the repo folder and start up your server: yarn bazel run server
27%
Tune your databases
29.09.2020
Home
»
Archive
»
2020
»
Issue 59: Custo...
»
. For instance, you can connect MySQL with: $ pmm-admin add mysql --query-source=slowlog --
=
root
--password=
Replace the username and password with the credentials of your MySQL database
27%
Exchange Web Services for Mailbox Access
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
access the
root
structure of a mailbox; it not only lets you view elements but also edit them directly. This makes it a very powerful tool and similar to the Microsoft Exchange MAPI Editor (known
« Previous
1
...
26
27
28
29
30
31
32
33
34
35
36
37
38
39
...
68
Next »