Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (644)
  • Article (205)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 94 Next »

24%
Harden your OpenStack configuration
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © zelfit, 123RF.com
is available again. Sore Point: Keystone The OpenStack Keystone identity service, officially dubbed Identity, is the root of all functionality in OpenStack. All clients that want to do something in Open
24%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
as follows, unless you want to disable firewalld. $ firewall-cmd --add-port=9090/tcp $ firewall-cmd --permanent --add-port=9090/tcp Now log in to the Cockpit web interface as root. Setting Up oVirt Engine
24%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
that is related to PowerShell 13 14 condition: 15 2 of ($hc) 16 } Notice the log and quarantine rules in Listing 3. If Yara is run as root, it can actually grab a file and place it into a quarantine
24%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
. Easier with Ansible In the circus of commercial automators, Ansible now occupies something of a back-to-the-roots role. Of course, this is no coincidence, because Ansible was created a few years ago out
24%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
a commercial license, which was not necessary before. As you are probably aware, it doesn't take long in the open source world for a free alternative to take root. Cinc enters the fray with the promise of being
24%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
be created that prevents the execution of arbitrary code, even if an attacker is working as root on the system. The Foundries stack scores bonus points because it can also natively use the cryptographic
24%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
back. How is an admin or developer, for which an active cloud-ready application already looks like the proverbial black box, supposed to find the root of the trouble now? Conventional Means Will Fail
24%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
like this will usually help you identify quickly which DC is the root cause of the problem. Then, you can take a closer look at it and check whether it is working within its site. The next step
24%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
as root, be careful. For example, to run the EP benchmark use: time mpirun -np 6 -h ./hostfile ep.B.x The output could be written to a random file in /tmp and parsed for the runtime. The benchmark time
24%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
again and run so-allow as root. Select analyst access and enter the IP address of your computer. Quick Access to Tools The web interface gives you direct access to your own functions from the menu

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 94 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice