48%
04.12.2024
Rubén Llorente ... " {
11 endpoint = "https://192.168.3.15:8006/"
12 username = "root@pam"
13 password = "proxmox"
14 insecure = true
15 tmp_dir = "/var/tmp"
16
17 ssh {
18 agent = true
19 }
20
48%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
47%
16.08.2018
Storage is a framework for uploading files via the web browser and then managing them using Rails. This is possible for your own server as well as for cloud servers and services (e.g., Amazon S3, Google ... Ruby on Rails 5.2 was released during RailsConf, which took place in Pittsburgh in mid-April 2018. Although not much has changed for old Rails applications, you'll find a few notable additions ... Version 5.2 of the Ruby framework
47%
30.01.2024
Rubén Llorente ...
8, 9
Debian
11, 12
Ubuntu
20.04, 22.04
FreeBSD
13.x
OpenBSD
7.3
I recommend the downloadable installer, but I will skip
46%
03.02.2022
Rubén Llorente ... either OpenPGP or S/MIME keys into the Nitrokey (see the "What is OpenPGP?" box). The steps for changing the PINs are very intuitive (Figure 3), but key initialization is not.
What is Open
45%
14.11.2013
, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response.
Although a normal desktop PC can handle about 1,000 DNS requests per second, a single DNS ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
42%
27.09.2021
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM. ... MicroK8s ... Zero-Ops Kubernetes with MicroK8s
42%
08.07.2013
Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others.
... -party cloud technologies with the help of its Delta Cloud API.
After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation ...
Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others.
... Red Hat’s Cloud Tools ... Red Hat’s Cloud and Virtualization Portfolio
42%
07.10.2014
SSH and sFTP hold several hidden treasures within their config files that you might not know about, especially if you are a new sys admin. Even if you have been using them for a while, a review ... The scope and functionality of SSH and sFTP provides both secure remote access and secure file transfers. ... SSH and sFTP Config
42%
09.10.2013
Moore’s Law continues its unwavering march, with a twist.
... , such as the rendering of a 3D scene.
The current apex of this development path is the NVidia Tesla K20X, which delivers a staggering 1.31 teraFLOPS of double-precision number-crunching performance. This performance ...
Moore’s Law continues its unwavering march, with a twist.