Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (503)
  • Article (163)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 71 Next »

15%
New container solutions for Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Scott Griessel, 123RF.com
easily be a Trojan running with root privileges. Moreover, Docker has moved so far away from its original goals that it has become virtually unusable in CoreOS. Rocket to the Rescue Rocket is the attempt
15%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
) is not a point-and-click task; however, aided by the complete documentation, it is well within the capabilities of any admin. The system does not require root privileges for the install or for operations on any
15%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
with the afick.pl -c -i command. On Linux you have to introduce the command with sudo for root privileges (Figure 1). To run it under Windows, open a command prompt with administrator rights, switch
15%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © satori, 123RF.com
. Doing so then lets you use Kubernetes tools without being root. Ideally, you would want to carry out this step immediately. As a Kubernetes admin, you cannot avoid the network. Although not nearly
15%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
OS and uses its default Anaconda installer, which is fairly intuitive. Just make sure that Rockstor picks up the correct disk for installation, and remember to set a strong root password. First Boot After
15%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
a hierarchy. The DNS root servers have provided support for DNSSEC and corresponding keys since 2010. They use them to sign the keys, which in turn are used to sign keys for the top-level domains. The key
15%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses root@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
15%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
on a Linux machine (it's theoretically possible with Windows but is untested!), you will need to change into the root directory of the downloaded Git repository and type the command: vagrant up
15%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
in these cases. Tapped The lmg script assumes that a Linux machine is available that can compile a kernel module suitable for the target system; this requires detailed knowledge of the target and a root account
15%
Network simulation with GNS3
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Joseasreyes, 123RF.com
in a cloud. This is especially easy if you set up GNS3 on a remote server with Ubuntu 16.04 LTS. In this case, you execute the following commands as root: # cd /tmp # curl https

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice