Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 ... 71 Next »

25%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
, standard username/password authentication will not work. Hetzner Launches New Ryzen-Based Dedicated Root Servers Hetzner is an Internet hosting company and data center operator out of Germany that provides ... In the news: The Python Clock Has Almost Reached Zero; Docker Hub Now Supports Two Factor Authentication; Hetzner Launches New Ryzen-Based Dedicated Root Servers; Microsoft Launches Bug Bounty
25%
Discovering SQL injection vulnerabilities
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Mika Specta, 123RF.com
cases, SQL injection was the root cause of a server's compromise.
18%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
is to build the S3QL filesystem on the mounted filesystem: [root@home4 ~]# mkfs.s3ql local:///mnt/data1 Before using S3QL, make sure to read the user's guide, especially the 'Important Rules to Avoid Loosing
18%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
system (a simple ext4 filesystem on a drive mounted as /mnt/data1). The first step is to build the S3QL filesystem on the mounted filesystem (Listing 1). First, notice that I created the file as root
18%
Millions of Android Devices Affected by Chinese Malware
06.07.2016
Home »  News  » 
 
are from India (1.35 million) and China (1.6 million). The US is not immune to HummingBad, with over 288,800 infected devices. The way this malware operates is that it tries to root Android devices
18%
Dirty Pipe Might be the Most Severe Vulnerability to Hit Linux in Years
09.03.2022
Home »  News  » 
 
could then add an SSH key to the root user's account such that any untrusted user could remotely access the server with full root privileges. The same vulnerability also makes it possible for attackers
18%
Kali Linux 2020.1 (Live)
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
of risk mitigation strategies" [1]. The newest Kali Linux [2] is: Non-root: The default user account is now the standard, unprivileged user kali , not the superuser account, root , as delivered
18%
Spanning Tree Protocol
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
from high convergence times in complex topologies, thus leading to failures of 30 to 50 seconds. The spanning tree table is computed in three main steps: Election of the root bridge Election
18%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
). Listing 2 ps.bro [BroControl] > ps.bro USER PID PPID %CPU %MEM VSZ RSS TT S STARTED TIME COMMAND >>> localhost (+) root 11766 11757 34.8 6.4 862984 96872
18%
SELinux Systems Vulnerable to sudo Vulnerability
06.06.2017
Home »  News  » 
 
a vulnerability in sudo's get_process_ttyname() for Linux. “On an SELinux-enabled system, if a user is Sudoer for a command that does not grant him full root privileges, he can overwrite any file

« Previous 1 2 3 4 5 6 7 8 9 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice