Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (394)
  • Article (116)
  • News (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 52 Next »

17%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
root access to install software on a Linux system, so that access is also assumed. System Preparation I only use Ubuntu for all Linux demonstrations, so everything, including installation of packages
17%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
17%
Set up subdomains with Apache and Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Saniphoto, Fotolia.com
89.221.14.204... Connected to www.wintermeyer.de. Escape character is '^]'. GET / HTTP/1.1 HOST: www.wintermeyer.de HTTP/1.1 301 Moved Permanently Server: nginx/1.10.3 Date: Fri, 27 Nov 2020 14
17%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
.linux-magazin.de; 04 05 root /var/www/www.linux-magazin.de; 06 index index.html index.htm; 07 08 # Let's Encrypt Challenge 09 # 10 location ~ /.well-known { 11 allow all; 12 } 13 14
17%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
manufacturers of operating systems, web browsers, and applications have already implemented their CA's root CA certificates, so that the client can validate the certificates without seeing error messages
17%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
) Btrfs for the root partition, XFS for data partitions RHEL 7 XFS Most filesystems are very similar and differ only in detail. The following terms will help you understand them
17%
Converting filesystems with Fstransform
24.09.2012
Home »  Articles  » 
 
filesystem. The hard disk should have at least 10 percent free space available in this case. Additionally, the appropriate system tools must be installed for the existing and new filesystem. For example
17%
Chive
17.04.2012
Home »  Articles  » 
 
the current user’s home directory. All you need to do then is copy the chive directory to the document root on the web server. To benefit automatically from future updates, you can install Chive version 1.0
17%
News for Admins
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains a local root shell in 10 minutes on i386 and 70 minutes on AMD64, on average," the researchers wrote. Qualys said that all systemd
17%
News for Admins
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
© Crimson, fotolia.com
. The study scanned 10,436 randomly selected, publicly accessible VPN servers taken from a scope of 4 million randomly selected IPv4 addresses. The results shows the following issues: 77% of the SSL VPNs

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice