Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (588)
  • Article (169)
  • News (101)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 86 Next »

10%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
. For example, you can now engage in some credential harvesting. Figure 12 shows how you can upload the Windows Credentials Editor (WCE) from the /usr/share/wce/ directory. This file allows you to obtain user
10%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
:33 deployment_image.qcow2 10 -rw-r--r-- 1 root root 57 Mar 2 10:21 deployment_image.qcow2.CHECKSUMS 11 -rw-r--r-- 1 42422 42422 318M Mar 2 10:13 ipa.initramfs 12 -rw-r--r-- 1 42422 42422 104 Mar 2 10
10%
High-performance backup strategies
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Kian Hwi Lim, 123RF.com
transfer just under 450GB per hour. In reality, this value is somewhat lower, but you can reckon on 400GB per hour. Restoring 5TB of data will take just under 12 hours, and 10TB will take a day or more
10%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
happy, I then ran an exceptionally useful command, $ microk8s inspect which, as noted on the MicroK8s Troubleshooting page [12], you can run at any time during the installation. (It might just tell you
10%
Kernel and driver development for the Linux kernel
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © psdesign1, Fotolia.com
_string; 08 09 static int prochello_show( struct seq_file *m, void *v ) 10 { 11 int error = 0; 12 13 error = seq_printf( m, "%s\n", output_string); 14 return error; 15 } 16 17 static int prochello
10%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
is a string like "1, 10, 12, 15, 2, 21, 3, …" and not the ascending order of the values. Exporting the data into another program and anchoring the desired sorting directly in the query by adjusting
10%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
storage is handled by the almost venerable ext3. The use of BusyBox [11] for most executable programs and of Dropbear [12] as the SSH daemon is the logical consequence of the Buildroot underpinnings
10%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
of these is node_exporter [12], which reads and provides operating system metrics such as memory usage and network load. Meanwhile, a number of exporters [13] exist for a wide range of protocols and services
10%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
" nodeInfo: architecture: amd64 containerRuntimeVersion: docker://1.12.6 kernelVersion: 4.4.0-72-generic osImage: Ubuntu 14.04.5 LTS GPU Scheduling Graphics processors do most
10%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
attached (Figure 12). The combination of these two privileges could let the misconfigured user create a new EC2 instance. Not only that, they will have operating system access to which they can pass

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice