Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (511)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 72 Next »

16%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
ID. However, in special cases, such as set user ID programs, an intruder could use this attack technique to obtain root privileges on a vulnerable system. All previous versions of X.org are affected
16%
SSH tools for Windows
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Maksim Kabakou, 123RF.com
SSH implementations prevent root access by default; uncommenting the following line: PermitRootLogin yes lets you enable it. Dealing with Host Keys For Linux admins, dealing with the SSH host key is part
16%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
worked at the command line and with a quantum command. As an example, Listing 1 shows the individual steps required. Listing 1 Assigning Floating IPs with Quantum root@alice:~# quantum net
16%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
, it will report back the exact path of the vulnerable files as well as the fixed version you'll need to remediate the issue. Log4j Detect should be run within the root directory of your projects and will also
16%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
usually can only be used by the root user. After starting the container, call http://localhost:4000 in your browser for a link to the API documentation and the Go profiler. To query Blocky's current
16%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
. The older tool is mysqlcheck: mysqlcheck -u root -pmy-secret-pw --check-upgrade --all-databases mysql.columns_priv OK mysql.db OK mysql
16%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
of accomplishing this added security is to confine the Julia process on the server to some type of virtual environment, such as a container from which it is impossible to see the machine's root filesystem. The use
16%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
. This could mean adding these names to your /etc/hosts file. Additionally, you need to be able to log in to all of the RADOS nodes as root later on for the call to mkcephfs , and root needs to be able to call
16%
TinyDNS
02.03.2012
Home »  Articles  » 
 
the name server will listen for queries (look for the IP files under root/   if you need to change it in the future). Believe it or not, that almost takes care of the installation. As an example of how
16%
GlusterFS
27.03.2012
Home »  HPC  »  Articles  » 
and should install them in this order, working as root: rpm -Uvh glusterfs-core-Version.x86_64.rpm rpm -Uvh glusterfs-fuse-Version.x86_64.rpm rpm -ivh glusterfs-geo-replication-Version.x86_64.rpm Typing

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 72 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice