Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 71 Next »

16%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
/containers/bullseye-1 https://debian.inf.tu-dresden.de/debian/ To log in to the container as root, pts/0 must be in /etc/securetty: echo "pts/0" >> /mnt/containers/bullseye-1/etc/securetty If you now want to start
16%
Run rootless Podman containers as  systemd services
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Geeky Shots on Unsplash
faster. Moreover, Podman defaults to running rootless containers, with ordinary user instead of root privileges. SELinux integration is also standard in distributions that support it. Overall, a server
16%
Hyper-V 3.0 in Windows Server 2012
12.11.2012
Home »  Articles  » 
 
to the network adapter, among other things. Single-Root I/O Virtualization (SR-IOV) is also new in Hyper-V. Under this specification, Hyper-V can also use hardware features of network adapters. To this end
16%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
of cores is to run multiple cp commands at the same time, either on specific files or specific subtrees (start at the lowest branch and work upward to root). This isn’t too difficult to script if you have
16%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
because the actual software stack typically varies from cluster to cluster. Thus, a vendor will often suggest other software and hardware as the root of a problem – and vice versa from other hardware
16%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
for the present Typo3 instance simply by evaluating the HTTP header order of the Typo3 back end (Table 1). The root cause of this error is that Typo3 separates
16%
Understanding Autodiscovery
20.12.2012
Home »  Articles  » 
 
: Nmap Command root@sandbox:~# nmap -v -A www.haribo.de ... Host www2.haribo.com (213.185.81.67) is up (0.011s latency). Interesting ports on www2.haribo.com (213.185.81.67): Not shown: 995 closed ports
16%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club’s annual congress. This attack allowed them to create a spoofed root certificate on an SSL certificate authority
16%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
the head node to the compute nodes. The nodes are all connected by Gigabit Ethernet. In the previous articles I added a root password for the container and configured Network Time Protocol
16%
Comparing Logon Script Alternatives
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Andrey KOTKO, 123RF.com
. PowerShell: The PowerShell command is: New-PsDrive -name m -Root \\SRV\DOCS \ -PsProvider FileSystem -persist PowerShell uses the cmdlet command type. Simplified, cmdlets can be understood

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice