search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(199)
Article
(97)
Blog post
(2)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
7
8
9
10
11
12
13
14
15
16
17
18
19
20
...
30
Next »
24%
Importing SSH keys on AWS
05.08.2011
Home
»
CloudAge
»
Blogs
»
Dan Frost's Blog
»
DEjAhocW2hraXMIIEowIBAAKCAQEAhXo2cUYv B8/P/BP0ges6i7VJ9Oj1bDHfILtu805syqw
N
5J6IBcgvesthq4Xpj4zuIVsCctU5SEIkx9texM+b .... fuy
3
QFJdl
3
rM0w/ry1QDRy5WgfZsIpAQZUuCaZgZx2BavviuVcFGrd67RfP6gt2yBk7Eh
N
0gQCN2 X5
24%
Goodbye cloud VMs, hello laptop VMs
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
to the launch command. For example, the command multipass launch -
n
mycloudvm -c 2 -m 2G -d
10
G --timeout 600 Table 1 Multipass launch Argument Action (v1.8.0 default) -
n
24%
Optimally combine Kubernetes and Ceph with Rook
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
. An alternative to Docker is CRI-O [
3
], which now officially supports Kubernetes. To use it on Ubuntu 18.04, you need to run the commands in Listing 1. As a first step, you set several sysctl variables; the actual
24%
Manipulation detection with AFICK
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
, but also acts as a small intrusion detection system. The tool is licensed under the liberal GNU GPLv
3
license, which also allows free use in the enterprise. AFICK only requires Perl v5.
10
or newer
24%
Administering virtual machines with PowerShell Direct
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
of PowerShell version 5, and since Windows
10
or the preview of Server 2016, Microsoft has provided a means for direct management of virtual systems without networking. A new featured called Power
24%
Cross-Vendor IPsec
25.10.2011
Home
»
Articles
»
-algorithm sha1; 07 encryption-algorithm
3
des-cbc; 08 } 09 policy test123 {
10
mode main; 11 proposals Phase1-
3
des-sha; 12 pre-shared-key ascii-text "$9$dQVgJiHmTF/.PO1Ehrlgoa
24%
Protect Your Servers with Nmap
23.07.2012
Home
»
Articles
»
for brevity] 8
10
.59 so-4-2-0.mpr
3
.pao1.us.above.net (64.125.28.142) 9 11.00 metro0.sv.svcolo.com (208.185.168.173)
10
9.93 scanme.nmap.org (64.13.134.52) Nmap
24%
When I/O Workloads Don’t Perform
12.05.2021
Home
»
HPC
»
Articles
»
) minutes. Extended self-test routine recommended polling time: ( 75) minutes. Conveyance self-test routine recommended polling time: (
3
) minutes. SCT capabilities: (0x
10
bd
24%
When I/O workloads don't perform
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
%util sda
10
.91 6.97 768.20 584.64 4.87 18.20 30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97
3
.52 nvme0
n
1 58.80 12.22 17720.47 48.71 230
24%
Netcat – The Admin’s Best Friend
20.08.2012
Home
»
Articles
»
the port after the file transfer has completed (but not without moving to the netcat-traditional package, as mentioned before): { echo -ne "HTTP/
1.0
200 OK\r\
n\r\n
"; cat filename.tar.gz; } | nc -l -p 15000
« Previous
1
...
7
8
9
10
11
12
13
14
15
16
17
18
19
20
...
30
Next »