Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 85 Next »

15%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
ID. However, in special cases, such as set user ID programs, an intruder could use this attack technique to obtain root privileges on a vulnerable system. All previous versions of X.org are affected
15%
SSH tools for Windows
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Maksim Kabakou, 123RF.com
SSH implementations prevent root access by default; uncommenting the following line: PermitRootLogin yes lets you enable it. Dealing with Host Keys For Linux admins, dealing with the SSH host key is part
15%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
worked at the command line and with a quantum command. As an example, Listing 1 shows the individual steps required. Listing 1 Assigning Floating IPs with Quantum root@alice:~# quantum net
15%
News for Admins
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
 
, it will report back the exact path of the vulnerable files as well as the fixed version you'll need to remediate the issue. Log4j Detect should be run within the root directory of your projects and will also
15%
Filter DNS queries with Blocky
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Bryan Garces on Unsplash
usually can only be used by the root user. After starting the container, call http://localhost:4000 in your browser for a link to the API documentation and the Go profiler. To query Blocky's current
15%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
. The older tool is mysqlcheck: mysqlcheck -u root -pmy-secret-pw --check-upgrade --all-databases mysql.columns_priv OK mysql.db OK mysql
15%
Get the best out of your bandwidth with tc
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Russell Shively, 123RF.com
as follows: Kilobits are referred to as Kbit. Megabits are referred to as Mbit. Gigabits are referred to as Gbit. tc qdisc del dev $DEV root Next, I'll install a qdisc. qdisc
15%
Configuring the JBoss application server
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
HONGQI ZHANG, 123RF.com
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.0-openjdk 02 # echo $JAVA
15%
Monitoring daemons with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Shariff Che'Lah, 123RF.com
involved and restart a daemon, remove block files, or even reboot the whole system. Because you should avoid running this kind of script as root, you can instead set up special users and groups to own
15%
Introduction to LVM
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Dvarg, 123RF.com
(or SSDs, LVM doesn't mind which) of 100GB each. They are named /dev/sda and /dev/sdb. Three partitions exist on /dev/sda; the first of them, sda1, is used as the swap area and is just 5GB. The root

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 47 48 49 50 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice