Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (592)
  • Article (181)
  • News (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 80 Next »

17%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
as a regular client to gain access to the data. Libvirt 0.9.12 or later can handle CephX, but the setup is not very intuitive. The following example is based on the assumption that a user named libvirt exists
17%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn
17%
Simple OpenStack deployment with Kickstack
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Mechanik, Fotolia.com
is tailored to work closely with Red Hat's own OpenStack distribution, RDO [2]. Kickstack, in turn, is more concerned with the classic Ubuntu environment running Ubuntu LTS version 12.04. Until one of the two
17%
URL Tricks with htaccess
02.02.2012
Home »  Articles  » 
 
for this example: Order Deny,Allow Deny from All Allow from 12.12.12.12 Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
17%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
, 28 ports open for incoming connections, and 441 packages installed and not updated for a while. Listing 2: grep, ps and netstat example results user@metasploitable:~$ uname -a Linux metasploitable 2.6
17%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
17%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
://dev.mysql.com/doc/relnotes/mysql/9.0/en/. NordVPN Launches File Checker Tool NordVPN has launched File Checker (https://www.globenewswire.com/Tracker?data=el9wEU_rBQa0VA4YBDAzMUm-twUCIKS38iW1CpZ6mv6Q1bUSqGzedAdTWU-x1-tZIWRzZXNED4Hq
17%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
style as Redundancy Groups: RAID-1, RAID-Z1 (like RAID-5), RAID-Z2 (like RAID-6), and RAID-Z3 (with triple parity). Netgear uses these modes, too, but calls them RAID-5 and RAID-6, following the classic
17%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
/11/2012 03:17 PM Favorites 04/16/2012 12:00 PM 60,304 g2mdlhlpx.exe 07/11/2012 03:17 PM Links 07/11/2012 03:17 PM Music 07/29/2012 03:56 PM
17%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
can use Kustomize or Helm to install the AWX operator with default settings, as described in the documentation [2]. Operator version 2.12.2 was used for this example. The main playbook for the AWX 00

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 80 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice