Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 93 Next »

26%
vglibc
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
Installing glibc.i686 into the VNFS [root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install glibc.i686 Loaded plugins: fastestmirror, refresh-packagekit, security Loading mirror
26%
vstdc
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
Installing libstdc++.i686 into the VNFS [root@test1 ~]# yum --tolerant --installroot /var/chroots/sl6.2 -y install libstdc++.i686 Loaded plugins: fastestmirror, refresh-packagekit, security Loading
26%
Vulnerabilities Found in Cisco Routers
29.01.2019
Home »  News  » 
 
device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root,” the company said in an advisory. Cisco has already released a patch to fix
26%
Hybrid IT Leads to Complexity and Lack of Visibility, Report Says
07.07.2022
Home »  News  » 
 
capabilities leads to organizational gaps, says Kerner, including the ability to effectively conduct anomaly detection and root-cause analysis and to gather metrics from disparate systems. Learn more at Data
26%
Known Linux Kernel Bug Being Actively Exploited
06.06.2024
Home »  News  » 
 
attacker could escalate privileges from a regular user to root in no time flat. Adding insult to injury, this vulnerability was present in pretty much all the major Linux distributions, including Debian
26%
Improving Docker security now and in the future
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
attackers can potentially work around the host's security features. At the same time, containers use the same user namespace as their host systems. In other words, if the process is running with root
26%
LXC 1.0
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © designpics, 123RF.com
containers. First Container After a successful installation, you can create the first container with a simple command: lxc-create -t ubuntu -n ubuntu_test Don't forget to obtain root privileges
26%
Automate the Active Directory Federation Services install
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © drubig-photo, fotolia.com
the federation service on the server. In this example, the issuing CA is also the root CA, which is not usually the case, although technically quite possible. Always remember that all certificates
26%
Linux and Windows client management with opsi
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © alexutemov, 123RF.com
7 to 10 (32- and 64-bit), the corresponding Microsoft servers (2008 R2 to 2012 R2), and common Linux systems. For an unattended setup, opsi uses the automatic hardware detection of the respective
26%
Automating with Expect Scripts
12.11.2012
Home »  Articles  » 
 
# # This Expect script was generated by Autoexpect on Thu Oct 11 15:53:18 2012 # Expect and Autoexpect were both written by Don Libes, NIST. # # Note that Autoexpect does not guarantee a working script

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice