Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 93 Next »

25%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
have it in the jail, and an attacker could exploit this vulnerability and thus obtain access to the jail, where they might even escalate to root. However, you would still have a major security advantage
25%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Companies that want to integrate their users' smartphones into their existing infrastructure can do so with various Microsoft products. One example is System Center Configuration Manager (SCCM) 2012
25%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
: [paths] data-home: /usr/local/debops If you only work as a root, you can alternatively use the path below /root . Speaking of root: You now need to run the debops-update command as the superuser
25%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
. If you don't have a Docker ID, head over to https://hub.docker.com to create one. Username (XXXXXX): WARNING! Your password will be stored unencrypted in /root/.docker/config.json. Configure
25%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
:27:27.618813008Z root Now that you've identified the storage location of your kube-proxy Pod from the output (userdata ), you can interrogate its configuration with the command: $ ls -al /run
25%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
node, create a test file: $ echo "hello world" | sudo tee -a /srv/hello.txt hello world $ cat /srv/hello.txt hello world $ ls -l /srv/hello.txt -rw-r--r-- 1 root root 12 Apr 8 16:37 /srv
25%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
System Tuning Options System memory MTU TCP tuning on the server NFS Management/Policy Options Subtree checking Root squashing Synchronous vs
25%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
25%
Storage pools and storage spaces in Windows
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Nathalie Diaz, fotolia.com
Microsoft introduced storage pools and storage spaces with Windows 8 and Windows Server 2012. They help combine physical disks with different capacities and technologies, such as USB, SATA, and SAS
25%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
environment. The parameters to change are located in /etc/ssh/sshd_config. The first security change is to deny root user logins by finding the line PermitRootLogin Yes and changing the Yes to No. If you

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice