Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 71 Next »

15%
An interview with SUSE CEO Nils Brauckmann
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photos Courtesy of Swapnil Bhartiya
with customers and technology partners." He said that while SUSE is preserving and leveraging its roots, "We are a company on the move because we are growing. We are investing in people, communities, and [the
15%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
.site_container}", 17 ] 18 connection { 19 type = "ssh" 20 user = "root" 21 private_key = "${file("${var.ssh_priv_key}")}" 22 } 23 } 24 } 25 output "IP" { 26 value
15%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
, which indirectly corresponds to assigning root privileges. If you want other users to be able to use Docker, they also need to be included in the docker group; then, the users have to log off and back
15%
Bpfilter offers a new approach to packet filtering in Linux
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © alphaspirit, 123RF.com
The roots of iptables go back to 1999. Starting with Linux 2.4, iptables finally replaced ipchains, which in turn had replaced the old-fashioned ipfwAdmin a few years earlier. The coming and going
15%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
it locally. Root privileges are needed if the location for the packages is only writable for the superuser. Table 2 shows a selection of useful extensions available from the Luarocks repository. Unfortunately
15%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
is influenced directly or indirectly by all previous levels. Multivariate analysis at the system level and the targeted use of machine learning algorithms for analysis and predictions enable efficient root cause
15%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
. Figure 1: Browser elements. When exploiting the browser, attackers generally focus on the interstice created between user mode and kernel mode. User mode is where you spend most of your time: the non-administrative/non-root
15%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
Computer Congress (31C3) in 2014 on the basis of an error in the SSH network protocol from 2002 (CVE-2002-0083). There, a single bit decided whether an attacker could gain root privileges on the machine
15%
Visualizing log and other data
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Gennadiy Poznyakov, 123RF.com
specifically to the root window (Figure 6). On request, however, Conky will present the information in a separate (transparent) window. Figure 6: Conky
15%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
2, 69 MPI_COMM_WORLD, 70 MPI_STATUS_IGNORE); 71 } 72 } 73 74 if (myid == 0) //if root process 75

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice