Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 93 Next »

24%
ID Views smooth migration to a new identity management system
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Nigel Silcock, Fotolia.com
was set up. However, when the login occurs on the gateway.example.com system, the user ID 5555 should be used. The following example makes this clear: [root@ipa1 ~]# getent passwd foobar foobar
24%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
edit podman.socket 08 mkdir -p /etc/systemd/system/podman.socket.d 09 cat >/etc/systemd/system/podman.socket.d/override.conf 10 [Socket] 11 SocketMode=0660 12 SocketUser=root 13 Socket
24%
News for Admins
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
 
with an explicit path. And in comparison to the Windows version of Hive, the Linux/FreeBSD iteration only includes one command-line parameter (-no-wipe). When executed without root permission, the Linux variation
24%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
specialized for particular kinds of work. London-based Security Roots is the developer of the open source Dradis [1] software for IT security teams. The framework creates standardized reports specifically
24%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
in all the popular distributions; if your environment is not supported, you can easily download the release from the GitHub project [1]. After the install, launch AIDE directly; you will need to be root
24%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
Server 2012 R2, but most settings also work in previous versions and with Windows 7/8. You will learn how to restore entire servers and repair virtualized environments based on Windows, as well as how
24%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
on ports with netstat -tulnp , although I can't see for sure which process listens on what port (root rights required). Nonetheless I can infer that, among others, Apache, Distcc, and Tomcat running
24%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
the name Centos because it works from two perspectives. The first is because of the root of “cento” which is defined as a literary work made up of the sum of other literary works and is quite appropriate
24%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
container, Docker, was created for developers to share their work easily. Because developers usually have root access on their development system, not much thought was given to security, so Docker needs
24%
Setting up FreeNAS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Franck, 123RF.com
, select the target drive on which to install FreeNAS and set a secure root password. You have now completed your install. Figure 1: Text-based menu

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice