Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (861)
  • Article (206)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 116 Next »

19%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
in all the popular distributions; if your environment is not supported, you can easily download the release from the GitHub project [1]. After the install, launch AIDE directly; you will need to be root
19%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
static websites. In late February, Amazon announced support for custom error documents and root documents. Previously, you could host all the content you wanted on AWS, but when people visited the root
19%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
The Linux sudo command helps Linux administrators run specific programs in the context of another user, typically root. In this way, non-privileged users can run management programs on a system
19%
Configuring WireGuard with wg-portal
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
a configuration in config/config.yml at start-up according to the log output. You might need root authorizations to create this file, because the config folder was created with root authorizations when
19%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
on ports with netstat -tulnp , although I can't see for sure which process listens on what port (root rights required). Nonetheless I can infer that, among others, Apache, Distcc, and Tomcat running
19%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
the name Centos because it works from two perspectives. The first is because of the root of “cento” which is defined as a literary work made up of the sum of other literary works and is quite appropriate
19%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
container, Docker, was created for developers to share their work easily. Because developers usually have root access on their development system, not much thought was given to security, so Docker needs
19%
Setting up FreeNAS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Franck, 123RF.com
, select the target drive on which to install FreeNAS and set a secure root password. You have now completed your install. Figure 1: Text-based menu
19%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
Enter file in which to save the key (/root/.ssh/id_rsa): eks-ssh 05 Enter passphrase (empty for no passphrase): 06 Enter same passphrase again: 07 Your identification has been saved in eks-ssh. 08 Your
19%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
as secrets when creating service accounts. Related concepts will be delivered during the alpha to beta stage of production, although it works quite well already. Privileged containers are the new root

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice