Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 71 Next »

15%
Up close with SUSE Linux Enterprise 12
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © kasza, 123RF.com
conscientiously points out that SLE differs from its predecessor in several fundamental ways: the filesystem is the first. SLE comes with Btrfs as the default for the root filesystem, making SLE the first major
15%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
is available again. Sore Point: Keystone The OpenStack Keystone identity service, officially dubbed Identity, is the root of all functionality in OpenStack. All clients that want to do something in Open
15%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
as follows, unless you want to disable firewalld. $ firewall-cmd --add-port=9090/tcp $ firewall-cmd --permanent --add-port=9090/tcp Now log in to the Cockpit web interface as root. Setting Up oVirt Engine
15%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
orchestrator: Whereas Kubernetes comes from Google's Borg cluster system, Prometheus is rooted in Borgmon, the monitoring tool for Borg. Matt Proud and Julius Volz, two former site reliability engineers (SREs
15%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
that is related to PowerShell 13 14 condition: 15 2 of ($hc) 16 } Notice the log and quarantine rules in Listing 3. If Yara is run as root, it can actually grab a file and place it into a quarantine
15%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
the machine is launched, the script is executed and the attacker is able to get a running shell on the machine with the root user (Figure 14). In this way, the attacker has full control over the machine
15%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
. Easier with Ansible In the circus of commercial automators, Ansible now occupies something of a back-to-the-roots role. Of course, this is no coincidence, because Ansible was created a few years ago out
15%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
a commercial license, which was not necessary before. As you are probably aware, it doesn't take long in the open source world for a free alternative to take root. Cinc enters the fray with the promise of being
15%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
be created that prevents the execution of arbitrary code, even if an attacker is working as root on the system. The Foundries stack scores bonus points because it can also natively use the cryptographic
15%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
back. How is an admin or developer, for which an active cloud-ready application already looks like the proverbial black box, supposed to find the root of the trouble now? Conventional Means Will Fail

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice