Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 ... 71 Next »

39%
A New Linux Vulnerability Could Provide Root Access to Systems
28.04.2022
Home »  News  » 
 
-of-check-time-of-use race condition issues, which could be leveraged to elevate privileges and deploy malware or carry out other malicious activities.” Nimbuspwn allows for attackers to deploy payloads (such as a root ... Microsoft discovered a pair of vulnerabilities in Linux that can be chained together to provide root access to would-be attackers. ... A New Linux Vulnerability Could Provide Root Access to Systems
39%
Linux Backdoor Doesn’t Need Root Privileges
17.02.2016
Home »  News  » 
 
28 cyber-espionage group, which reportedly has ties with Russia. One insidious quality of Fysbis is that it doesn't require root access to start working for the attacker. The malware is apparently ... Linux Backdoor Doesn’t Need Root Privileges
39%
Hetzner Launches New Ryzen-Based Dedicated Root Servers
01.11.2019
Home »  News  » 
 
certificates, storage, and cloud solutions. Recently the company announced the launch of a new line of Ryzen-based dedicated root servers that offer a significant boost in performance for customers across all ... Hetzner Launches New Ryzen-Based Dedicated Root Servers
38%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
Remora combines profiling and system monitoring to help you get to the root of application problems by revealing its use of resources. ... was mpirun … /mpiapp.exe . Notice that both commands are run as user, not root, which goes back to the design of Remora: a focus on users and providing them with useful information. This next example ... Remora combines profiling and system monitoring to help you get to the root of application problems by revealing its use of resources.
33%
Microsoft Says Linux Can Host Hyper-V
17.09.2020
Home »  News  » 
 
, however, Linux guests don't have direct access to hardware and the Hyper-V root partition can only run the Windows operating system. Why is this? Because although Linux already includes support for Hyper ... The Hyper-V root partition will offer support for Linux systems.
30%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
users happy with security, Podman lets users fire up the run time without being the root superuser. When Podman is run as a less privileged user, it sets up and then enters a user namespace . Once inside ... The Podman alternative to Docker is a daemonless container engine with a run time that executes on request in root or user mode.
30%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
... ./mpiapp.exe if the original command was mpirun … /mpiapp.exe. Notice that both commands are run as user, not root, which goes back to the design of Remora: a focus on users and providing them with useful ... Remora combines profiling and system monitoring to help you get to the root of application problems by revealing its use of resources.
30%
Big Samba Security Bug Revealed
03.03.2015
Home »  News  » 
 
The Samba team has confirmed a recent CVE report (CVE-2015-0240) regarding a flaw in the smbd file server daemon that could allow a remote user to execute arbitrary code with root privileges ... A skilled attacker could coax vulnerable versions of the feisty file server into executing arbitrary commands with root privileges.
29%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
of all cases, SQL injection was the root cause of a server’s compromise. ... of all cases, SQL injection was the root cause of a server’s compromise.
29%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
If the Linux server crashes, not only do you need to restore operations, you also need to analyze the problem. What happened? Where is the root of the error? What preventive measures are necessary ... this change. Test Crash If you are not convinced, you can check /proc/iomem to see that the protected memory space is marked (Listing 1). Listing 1: Preparations for the Kernel Dump [root@rhel ~]# grep -i

« Previous 1 2 3 4 5 6 7 8 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice