search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(241)
Article
(94)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
34
Next »
21%
Modern Fortran – Part 2
15.12.2016
Home
»
HPC
»
Articles
»
are over i = 2,
n
− 1 and j = 2,
n
−1. Here is how you can write the iteration over the domain using array notation:
a
(2:
n
-
1,2
:
n
-1) = 0.25 * & (
a
(1:
n
-
2,2
:
n) + a
(3:
n
,2:
n) + a
(2:
n
,1:
n
-2) +
a
(2:
n
,3:
n
21%
CRI-O and Kubernetes Security
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
cri-o-${CRIO_VERSION} The following NEW packages will be installed cri-o-1.17 0 to upgrade, 1 to newly install, 0 to remove and 0 not to upgrade. Need to get 17.3
MB
of archives. After this operation
21%
Exploring Kubernetes with Minikube
11.09.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
. Figure 6: Good old ``get pods'' but with width: ``kubectl get pod nginx-dep-54b
9
c79874-b
9
dzh -o wide'' showing an internal pod IP Address in the 172.17.0.0 range. Use the -
n
option to specify
21%
Automation Scripting with PHP
16.10.2012
Home
»
Articles
»
6), and start stream blocking (line 7), which executes the command and waits for the response. Now, write the output to a variable (lines
9-12
), close the stream (line 14), and send the response
21%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -
N
1 -s 100 echo -
n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
21%
Guarding against social engineering attacks
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
will be
2.2
GB lighter. Figure 1: The download options with the SHA
256
checksum to make sure it matches the reported checksum on the site. Be sure
21%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
use generic-service 21 host_name w2k
12
srv
22
service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -c 90 24 } 25 define service{ 26
21%
OpenACC – Porting Code
07.03.2019
Home
»
HPC
»
Articles
»
Loops Fortran C !$acc parallel loop do i=1,
n
A
(i) = B(i) + C(i) enddo !$acc parallel loop do j=1,m B(i) = B(i) * D(i) enddo #pragma
21%
Security first with the Hiawatha web server
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-
9
A
-Z]{0,2}) Deny
21%
Sharing Linux Terminals
13.07.2022
Home
»
HPC
»
Articles
»
. Figure 5: Terminal after creating a new tmux window. To cycle through windows, press Ctrl+B-
n
(next), Ctrl+B-p (previous), or Ctrl+B-x (where x =0-
9
) to go to
a
specific window. If you type Ctrl
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
34
Next »