Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 71 Next »

17%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
(STA). STP will choose a switch to be the root switch automatically. (It is also possible to choose the root switch manually through configuration.) After a root switch is chosen, all non-root switches
17%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
. Figure 1: Prompting for the root password in YaST2 firstboot. Using Kiwi Regardless of the type of system image to be created, you need a description of the system in XML format that contains all
17%
Rebuilding the Linux ramdisk
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Barmaliejus, Fotolia.com
an important role, since it ensures that the root filesystem can be accessed after the computer has been restarted, to be able to access all the tools that are necessary for the computer to continue booting
17%
Quest Updates Unix sudo Tool
15.12.2011
Home »  News  » 
 
to be run as root or other users, with command logging and fine-grained access controls. Sudo 1.8, which was released in March 2011, includes a new pluggable architecture that allows third-party plug
17%
More Than 80% of Android Devices at Risk of Attack
17.08.2016
Home »  News  » 
 
. The root cause of this flaw is a serious vulnerability in the TCP specification that “allows a blind off-path attacker to infer if any two arbitrary hosts on the Internet are communicating using a TCP
17%
New Systemd Vulnerability Affects Most Mainstream Linux Distributions
15.01.2019
Home »  News  » 
 
-2018-16866) resides in "systemd-journald" service and could allow an attacker to gain root access on the targeted systems. "We developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains
17%
Hive Ransomware Hitting Linux and FreeBSD Systems
02.11.2021
Home »  News  » 
 
of Hive, the Linux/FreeBSD iteration only includes one command-line parameter (-no-wipe). When executed without root permission, the Linux variation of Hive fails to trigger the encryption, because it isn
17%
Another Serious Flaw Found in All Major Linux Distributions
26.01.2022
Home »  News  » 
 
discovered the pkexec command could be used by local attackers to increase privileges to root in Ubuntu, Debian, Fedora, and CentOS (and warn that it's most likely exploitable in other distributions as well
17%
Dangerous Vulnerability Found in Mozilla VPN Client
09.08.2023
Home »  News  » 
 
. The flaw was discovered by SUSE developers, who found that the program contains a “privileged D-Bus service running as root and a Polkit policy.” They disclosed the issue to Mozilla in May but failed to get
17%
Firefox Fixes Error that Crashed HTTPS Pages
02.07.2019
Home »  News  » 
 
can enable the ‘enterprise roots’ preference that allows Firefox to import any root CAs that have been added to the OS by the user, an administrator, or a program that has been installed on the computer

« Previous 1 2 3 4 5 6 7 8 9 10 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice