Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (846)
  • Article (205)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 114 Next »

19%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
have it in the jail, and an attacker could exploit this vulnerability and thus obtain access to the jail, where they might even escalate to root. However, you would still have a major security advantage
19%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
: [paths] data-home: /usr/local/debops If you only work as a root, you can alternatively use the path below /root . Speaking of root: You now need to run the debops-update command as the superuser
19%
Visualizing containers with clarity
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Ulrich Müller, 123RF.com
. If you don't have a Docker ID, head over to https://hub.docker.com to create one. Username (XXXXXX): WARNING! Your password will be stored unencrypted in /root/.docker/config.json. Configure
19%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
:27:27.618813008Z root Now that you've identified the storage location of your kube-proxy Pod from the output (userdata ), you can interrogate its configuration with the command: $ ls -al /run
19%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
node, create a test file: $ echo "hello world" | sudo tee -a /srv/hello.txt hello world $ cat /srv/hello.txt hello world $ ls -l /srv/hello.txt -rw-r--r-- 1 root root 12 Apr 8 16:37 /srv
19%
Useful NFS options for tuning and management
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © gortan123, 123RF.com
System Tuning Options System memory MTU TCP tuning on the server NFS Management/Policy Options Subtree checking Root squashing Synchronous vs
19%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
] and Docker [2], one of the primary goals for malicious actors is seeking to compromise a pod or Docker instance. Once they find a way to escape to the host, they can gain root access, resulting in critical
19%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
, and root. It sends the current user's public key to the remote host and adds it to the ~/.ssh/authorized_keys file for both remote users. It also changes the SSH configuration for the remote root user
19%
Storage pools and storage spaces in Windows
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Nathalie Diaz, fotolia.com
Microsoft introduced storage pools and storage spaces with Windows 8 and Windows Server 2012. They help combine physical disks with different capacities and technologies, such as USB, SATA, and SAS
19%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
environment. The parameters to change are located in /etc/ssh/sshd_config. The first security change is to deny root user logins by finding the line PermitRootLogin Yes and changing the Yes to No. If you

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 114 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice