Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (23)
  • Article (5)
Keywords

1 2 3 Next »

100%
Automating deployments on Proxmox with OpenTofu and cloud-init
04.12.2024
Home »  Articles  » 
Lead Image © lightwise, 123RF.com
Rubén Llorente ... --scsi0 local-lvm:0,import-from=/root/tmpimages/openbsd-min.qcow2 # Turn the VM into a template qm template 100 The steps in Listing 1 are mostly self-explanatory, but some of the arguments passed
16%
Serverless applications with OpenFaaS
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kier in Sight Archives on Unsplash
Isolation OpenFaaS implements several pod-level security best practices out of the box. The OpenFaaS core components (gateway, watchdog, etc.) run as non-root users. Additionally, the official function
16%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
on the target system. You will also want to disable SSH login for root with the PermitRootLogin no option and disable the password authentication option with the PasswordAuthentication no option. SSH keeps
16%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
). Figure 2: Configuring a static IP address on a VPN server. Other prerequisites include setting a root password, running updates on the Ubuntu virtual machine, installing SSH, temporarily disabling
16%
Automated health checks
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © kritiya, 123RF.com
specialized for particular kinds of work. London-based Security Roots is the developer of the open source Dradis [1] software for IT security teams. The framework creates standardized reports specifically
16%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
in all the popular distributions; if your environment is not supported, you can easily download the release from the GitHub project [1]. After the install, launch AIDE directly; you will need to be root
16%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
that the container environment strictly counteracts these risks. In principle, Docker can also handle containers without root privileges. By default, Podman uses containers without root privileges that run
16%
Looking Backward, Looking Forward
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Image © thvideo, 123RF.com
systems rebooting randomly; patching events going wrong, with multiple systems never recovering; and user accounts (e.g., administrator and root) being locked out so that no human intervention or mitigation
16%
KISS – Adding a New User
04.11.2024
Home »  HPC  »  Articles  » 
. If a file is older than that time, a “sweeper” cron job moves their data to slower speed storage and chown  it to root so that no one except root can access the file. If a user really has to have that data
16%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
need to allow at least 1GB of RAM in single-process mode for the sensor component, which also requires root privileges. The server component has no specific requirements, and the install process

1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice