search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(93)
Article
(49)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
8
9
10
11
12
13
14
15
23%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
23%
Compiler Directives for Parallel Processing
12.08.2015
Home
»
HPC
»
Articles
»
's definitely not a small organization, having well over 12
x
1015 floating-point operations per second (12PFLOPS) of peak performance in aggregate. At the recent XSEDE conference during a panel session
23%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
« Previous
1
...
8
9
10
11
12
13
14
15