Root Install

  • Home
  • About
  • Contact Us
  • Tutorials
    • linux
    • system administration
    • ethical hacking
    • python
    • database
    • hacking-tools

Tag: cloud computing

Exposing Ransomware in Linux-based Multi-cloud Environments

Posted on January, 2023January, 2023 by Rimsha Ashraf

Linux is the most popular operating system in multi-cloud environments and has been dominant for the past five years. But the fact that most malware countermeasures currently in place focus on Windows-based malware threats leaves many public and private cloud … Read more

Tagged cloud computing, ethical hacking, linux

How to Install and Set Up the Kubernetes Dashboard

Posted on April, 2022April, 2022 by Zaher Talab

Introduction

Kubernetes is a cornerstone for the development of microservices SaaS and cloud-native software. Microservices necessarily need container technology and container orchestration since their architecture usually addresses a large number of containers. 

In this context, the Kubernetes dashboard is the … Read more

Tagged cloud computing, devops, system administration

A Simplification of Kubernetes Architecture and its Components

Posted on February, 2022February, 2022 by Zaher Talab
Image from: https://www.aquasec.com/cloud-native-academy/kubernetes-101/kubernetes-architecture/

Kubernetes as an orchestration platform for containers is similar to a whole human community or a national state. As in that, every single container is as a citizen in it. Many metaphors are used to explain Kubernetes … Read more

Tagged cloud computing, devops

Introduction to Docker

Posted on February, 2021February, 2022 by Abdou Rockikz

Docker is an open-source virtualization platform. It went open source in 2013 and has seen rapid adoption in companies since then. Docker offers OS-level virtualization to package software such as web servers, databases into containers. This essentially removes the virtual … Read more

Tagged cloud computing, devops, system administration

Tags

c++ ci/cd cloud computing cracking curl database devops docker ethical-hacking ethical hacking FFmpeg forensics hacking-tools javascript linux metadata networking pdf python scapy steganography system administration ubuntu windows

Recent Posts

  • 7 Best Tools To Test MITM (Man In The Middle) Attacks
  • Top 8 Tools To Protect Against Botnet Attacks
  • Linux Malware on the Rise: Tops Attacks to Look for and How to Protect Against Them
  • Top 5 Malware Scanners for Linux
  • Exposing Ransomware in Linux-based Multi-cloud Environments

Copyright © Root Install 2023

  • Privacy Policy
  • Contact Us
  • About