Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (861)
  • Article (206)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 116 Next »

18%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
not be propagated by the synchronization task. In this test environment, a local HTTP server index page, the root filesystem capacity, and system health (CPU, memory usage) were all monitored separately in the main
18%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
and boots. From now on, everything that would be possible after booting from a local medium is theoretically feasible. For example, having your own root filesystem on a server in the network and operating
18%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
, you can then determine where the threat of attacks is greatest. If your career path is firmly rooted in the security context, it makes sense to take a very close look at Kali Linux. I highly recommend
18%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
are the root causes of breakdown-prone software. As early as 1972, scientists described the first, albeit theoretical, buffer overflow attack [1], and SQL injections [2] have been around since 1998. Both still
18%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
Ops team has found the root of this evil but would like to test a special version of the application with Firefox users before rolling it out for everyone (i.e., a canary release). How would this work
18%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
have configured and saved your changes, you can then run broctrl as root to enter the interactive session. Once you enter the command $ sudo -i broctl you'll be placed into the interactive session
18%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
solution. The Docker documentation also refers to "storage drivers," which involves storing data in the container and focuses on the container's root filesystem. The developers point out that normal data
18%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
, reset the system, access a root shell, reboot, or shut down. Once the system has received an IP address from a DHCP server, the address will be displayed on this screen and can be used to access the web
18%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
SSHion" vulnerability (CVE-2024-6387 – https://www.cve.org/CVERecord?id=CVE-2024-6387), is "a signal handler race condition in OpenSSH's server (sshd)," which allows unauthenticated remote code execution (RCE) as root
18%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
GitHub repository and launching the process with build-all.sh from the root of the repo. Before moving in with all of the previous steps involving your system-wide installation method with cargo

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 116 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice