Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (641)
  • Article (165)
  • News (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 85 Next »

16%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
plus maybe a couple of modules. You also need the document root to exist. A more complete list of what you need to get your site working is: Apache Some modules A couple of config files
16%
Linux Essentials for Windows Admins – Part 1
10.07.2012
Home »  Articles  » 
 
functionality, and analogous configuration. Unix Security Information Like Windows, Unix has two primary user security levels: User and Administrator. The administrative user on Unix systems is the root user
16%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
-lts \ --user root \ -p 0.0.0.0:8080:8080 \ -p 0.0.0.0:8443:8443 \ -p 0.0.0.0:50000:50000 \ --env JENKINS_OPTS="--httpPort=8080" \ --env JAVA_OPTS=-"Djavax
16%
Protecting Samba file servers in heterogeneous environments
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by rawpixel on Unsplash
that was present during testing [3]. After installation, you can connect to the server via SSH. A direct connection as root is not possible; the configuration of SSH prohibits a direct login as root, and you should
16%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Stuart Miles, 123RF.com
in case of a problem. To set up Let's Encrypt: cd /root git clone https://github.com/letsencrypt/letsencrypt cd letsencrypt ./letsencrypt-auto --server https://acme-v01.api
16%
Warewulf 4 – Python and Jupyter Notebooks
13.04.2023
Home »  HPC  »  Articles  » 
/apps/anaconda $ sudo adduser anaconda From this new directory, install the latest version of Anaconda. You will probably have to install as root or withsudo , but it is installed as if you were installing it into your
16%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
as the root user and can download images and mount volumes, among other things. Why is this bad? Well, the run command can legitimately mount the entire filesystem on the host machine with ease. Consider being
16%
Building Virtual Images with BoxGrinder and VMBuilder
07.01.2013
Home »  Articles  » 
 
.3). Default values are used for all other parameters. In the os section, you can use password to specify the desired root password (by default, it is boxgrinder ). The hardware section is where you
16%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
FS-Cache Filesystem-independent mount options 2. System tuning options System memory MTU TCP tuning on the server 3. NFS management/policy options Subtree checking Root
16%
Sort out your SSH configs
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © saniphoto, fotolia.com
time you want to log in to your server. The config file can be found at /etc/pam.d/sshd. As a non-root user, you should take a peek at the file to get an idea of what happens at the PAM level upon

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice