Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (538)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 75 Next »

16%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
. If you don't have a Docker ID, head over to https://hub.docker.com to create one. Username (XXXXXX): WARNING! Your password will be stored unencrypted in /root/.docker/config.json. Configure
16%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
:27:27.618813008Z root Now that you've identified the storage location of your kube-proxy Pod from the output (userdata ), you can interrogate its configuration with the command: $ ls -al /run
16%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
node, create a test file: $ echo "hello world" | sudo tee -a /srv/hello.txt hello world $ cat /srv/hello.txt hello world $ ls -l /srv/hello.txt -rw-r--r-- 1 root root 12 Apr 8 16:37 /srv
16%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
System Tuning Options System memory MTU TCP tuning on the server NFS Management/Policy Options Subtree checking Root squashing Synchronous vs
16%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
16%
Rex
19.02.2013
Home »  Articles  » 
" ). Listing 3: Rexfile for Setting Up Apache 01 user "root"; 02 03 Desc "Apache installation"; 04 task "apacheinstall", sub { 05 06    install package => "apache2"; 07    service "apache2" => "start"; 08 09
16%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
environment. The parameters to change are located in /etc/ssh/sshd_config. The first security change is to deny root user logins by finding the line PermitRootLogin Yes and changing the Yes to No. If you
16%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
certificate authority (CA) on your intranet to manage and sign certificates for the connected services. Internal computers then only need to trust that this internal root CA for all keys signed
16%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
between Linux and Windows filesystems through multiple interfaces (source: [5]). The primary WSL filesystem is VolFs. It is used for the root directory of the respective Linux instance. VolFs provides
16%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
is not in the data-home directory in DebOps. If you work as root, you can call the debops-init command below /root. The rest of the path is the typical folder structure that Ansible expects (Figure 2

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice