search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb%C3%A9n Llorente 22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(84)
Article
(37)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
Next »
16%
Security data analytics and visualization with R
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W
3
C
Apache log entries down to just
16%
Aggregating information with Huginn
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
. The required modifications are explained in the Huginn wiki [
3
]. The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version
2.2
or 2.
3
15%
Network backups with Amanda
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
as the user name. Amanda versions before
3.3.9
have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version
3.3.9
is only necessary if you don't trust
15%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
use generic-service 21 host_name w2k12srv
22
service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -
c
90 24 } 25 define service{ 26
15%
Gathering Data on Environment Modules
10.09.2012
Home
»
HPC
»
Articles
»
tell logger which log to use: [laytonjb@test1 ~]$ logger -p cron.notice "This is a cron test" ... [root@test1 ~]# tail -
n
2 /var/log/cron Aug
22
17:10:01 test1 CROND[7438]: (root) CMD (LANG=
C
LC_ALL=
C
15%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.
9
20 # user setup 21 user --name=example-user --password=
--iscrypted --gecos="example-user"
22
# Disk partitioning
15%
Command-line tools for the HPC administrator
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
in cs us sy id wa st 04 1 0 0 5279852 2256 668972 0 0 1724 25 965 1042 17
9
71 2 0 05 1 0 0 5269008 2256 669004 0 0 0 0 2667 1679 28
3
69 0 0 06 1 0
15%
Many Clouds, One API
22.08.2011
Home
»
Articles
»
.keys.sort.each do |s| 14 printf "%20s %d\
n
", s, summary[s] 15 end 16 puts "Polling for changes (Ctrl-
C
to end)" 17 loop do 18 sleep 2 19 client.instances.each do |inst| 20 if state[inst.id] != inst.state 21
15%
OpenLDAP Workshop
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
directory and link with the required certificate hash: $ sudo certutil -L -d /etc/openldap/certs -
n
"OpenLDAP Server" -
a
> /etc/pki/tls/certs/ldap.acme-services.org.crt $ sudo ln -sf /etc
15%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
Laboratory Technical Report 536, 2002: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf Becher, M., M. Dornseif, and
C.N
. Klein. "FireWire: All Your Memory are Belong to Us." A presentation at Can
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
Next »