62%
02.06.2020
Rubén Llorente ... of the software and turn Citadel/UX into an actual groupware solution. In 1999, Citadel/UX was licensed under GNU General Public Licence (GPLv2), becoming free software.
With its roots in the BBS realm, the core
61%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
61%
03.02.2022
Rubén Llorente ... _identifier with the string you got in the previous step. This operation requires root privileges.
The last part is dangerous; mistakes may render your operating system unusable, so ensure you have a rescue CD around just
54%
12.05.2021
Isolating and diagnosing the root causes of your performance troubles.
... . 7079.6 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
3294 root 20 0 748016 4760 988 S 13.3 0.1 0:01.19 fio
3155 root 20 ...
Isolating and diagnosing the root causes of your performance troubles.
31%
06.10.2019
time relative to Docker.
Docker Dominance
The first version of Docker [1] was released March 20, 2013. Although containers had already been available on Unix-like systems for a few years, Docker ... The Podman alternative to Docker is a daemonless container engine with a run time that executes on request in root or user mode.
30%
25.11.2012
If the Linux server crashes, not only do you need to restore operations, you also need to analyze the problem. What happened? Where is the root of the error? What preventive measures are necessary ... this change.
Test Crash
If you are not convinced, you can check /proc/iomem
to see that the protected memory space is marked (Listing 1).
Listing 1: Preparations for the Kernel Dump
[root@rhel ~]# grep -i
24%
31.10.2025
Preparations for the Kernel Dump
[root@rhel ~]# grep -i crash /proc/iomem
03000000-0affffff : Crash kernel
[root@rhel ~]# grep crash /proc/cmdline
ro root=/dev/mapper/VolGroup00-LogVol00 rd ... If the Linux server crashes, not only do you need to restore operations, you also need to analyze the problem. What happened? Where is the root of the error? What preventive measures are necessary
18%
06.06.2017
with root privileges.
The vulnerability exists in sudo 1.7.10 through 1.7.10p9, inclusive, and sudo 1.8.5 through 1.8.20p1, inclusive. A fix has been released in sudo 1.8.20p2.
If you are alarmed about more
17%
20.11.2013
is to build the S3QL filesystem on the mounted filesystem:
[root@home4 ~]# mkfs.s3ql local:///mnt/data1
Before using S3QL, make sure to read the user's guide, especially
the 'Important Rules to Avoid Loosing
17%
26.01.2022
discovered the pkexec command could be used by local attackers to increase privileges to root in Ubuntu, Debian, Fedora, and CentOS (and warn that it's most likely exploitable in other distributions as well