search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(354)
Article
(115)
News
(34)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
6
7
8
9
10
11
12
13
14
15
16
17
18
19
...
51
Next »
30%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
via 192.168.1.1 dev eth1 13 $ ip netns exec ns1 ping -c2 8.8.8.8 14 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 15 64 bytes from 8.8.8.8: icmp_seq=1 ttl=51 time=
22
.1 ms 16 64 bytes from 8.8.8.8: icmp
30%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
): ssh-keygen -t ed25519 -
a
100 -f ubuntu-sre-id_ed25519 -q -
N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
30%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
$st2->execute($dbh->{pg_pid}); 16 if( !$st2->fetchrow_arrayref->[0] ) { 17 warn "couldn't stop backend PID=$dbh->{pg_pid}\
n
"; 18 } 19 exit 1; 20 } 21
22
POSIX::sigaction(SIGTERM, POSIX
30%
Rethinking RAID (on Linux)
16.03.2021
Home
»
HPC
»
Articles
»
(local to host dev-machine) UUID :
a
84b0db5:8
a
716c6d:ce1e
9
ca6:8265de17 Events :
22
Number Major Minor RaidDevice State 0 8 33 0 active
30%
Gathering Data on Environment Modules
10.09.2012
Home
»
HPC
»
Articles
»
to logfiles, and it’s pretty simple to use: [laytonjb@test1 ~]$ logger "This is a test" ... [root@test1 ~]# tail -
n
2 /var/log/messages Aug
22
15:54:47 test1 avahi-daemon[1398]: Invalid query packet. Aug
22
17
30%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
for a graphical approach to Metasploit. Meterpreter [
9
] is probably the most appealing payload an attacker can install on a remote computer. It can be easily hidden in other file formats (e.g., PDFs), sent
30%
Tuning I/O Patterns in C
31.07.2013
Home
»
HPC
»
Articles
»
Code Example 1 #include
2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 };
9
10 int main() 11 { 12 int counter; 13 struct rec my
30%
HDF5 and Parallel I/O
17.05.2017
Home
»
HPC
»
Articles
»
, 5 ) / ( 8, 5 ) } DATA { (0,0): 0, 1, 2, 3, 4, (1,0): 5, 6, 7, 8,
9
, (2,0): 10, 11, 12, 13, 14, (3,0): 15, 16, 17, 18, 19, (4,0): 20, 21,
22
, 23, 24, (5,0): 25, 26, 27, 28, 29, (6
30%
Shared Storage with NFS and SSHFS
12.09.2018
Home
»
HPC
»
Articles
»
. Moreover, you don't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port
22
30%
Shared Storage with NFS and SSHFS
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
't need to add or run a special client tool on the client nodes or a special server tool on the storage node; SSH just needs to be active on your system. Almost all firewalls allow port
22
access, so you
« Previous
1
...
6
7
8
9
10
11
12
13
14
15
16
17
18
19
...
51
Next »