search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(281)
Article
(52)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
34
Next »
30%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [
3
]. One remaining
30%
Look for file changes and kick off actions with Watchman
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
for changed files from the command line). Listing 1 Configuration File 01 { 02 "version": "
3
.0.0", 03 "watched": [ 04 { 05 "path": "/opt/repos", 06 "triggers": [] 07 }
08
30%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
are available to let administrators manage jails on the host system [
6
]. Here's a brief look: jail [-i] [-l -u
| -U
]
: Starts a jail
30%
Static code analysis finds avoidable errors
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
instructions but still provokes an explicit warning (Figure
3
). Listing
6
Too Many Characters 01 #include
02 #include
03 #define BUFSIZE 10 04 05 int main(/*@unused@*/ int
30%
Security first with the Hiawatha web server
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
. One easy way to set up a Hiawatha virtual machine is to start up the TurnKey Linux Nginx VM [
3
], then remove Nginx and add Hiawatha. Start by downloading the TurnKey Linux Nginx VM, a small Linux
30%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home
»
Articles
»
other values passed in end up in the rest array. The three dots (splats) show that the caller can pass in an arbitrary number of values. The a 1,2,
3,4,5,6
statement thus would output
3,4,5,6
. If you
30%
Pen Test Tips
30.04.2012
Home
»
Articles
»
, severity, name, and family of each plugin as it relates to the Metasploit Framework (see Figure
3
). The Name section tells you which Metasploit exploits have the best chance to be successfully against
30%
Gatling load-testing tool
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
class BlazeDemoV1 extends Simulation {
08
09 var qualifiedhost = "http://blazedemo.com" 10 var proxyport = 0 11 var proxyhost = "not set" 12 13 // headers for HTTP call 14 val headers = Map( 15
30%
Jenkins Configuration as Code
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
://misiu.pl:8080/"; 04 05 JenkinsLocationConfiguration jlc = JenkinsLocationConfiguration.get() 06 07 jlc.setUrl(newRootURL);
08
jlc.save(); Listing
3
shows two sample YAML files used by JCasC to set up
30%
VTP for VLAN management
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
active Fa0/1, Fa0/2, Fa0/
3
, Fa0/4, Fa0/5, Fa0/
6
, Fa0/7, Fa
0/8
, Fa0/9, Fa0/10, Fa0/11, Fa0/12 10
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
34
Next »