search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(307)
Article
(41)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
8
9
10
11
12
13
14
15
16
17
18
19
20
21
...
35
Next »
67%
Setting up FreeNAS
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
NAS Early versions of FreeNAS originate from the embedded firewall project
m
0n0wall, and the software has since undergone a complete metamorphosis. The current version is built on powerful open source
67%
A Password Protection Service
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
= 127.0.0.1/
8
192.168.1.55 192.168.1.89 Save the jail.local file. You'll want to protect any exposed service port on your system. For this article, I'
m
going to protect SSHD. For each service
67%
Service mesh for Kubernetes microservices
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
to address. Run $ istioctl authn tls-check
to see that
m
TLS is successfully configured on all of your services (Figure
8
). Figure
8
: Checking for
m
67%
The AWS CDK for software-defined deployments
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
began to offer drift detection [
8
]). The executable also provides a robust set of commands and tools to inspect and (if necessary) manipulate the state of a deployment directly. Flexible. Terraform
67%
Versioned backups of local drives with Git
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
into a deceptive sense of security: Thanks to technologies such as self-monitoring analysis and reporting technology (S.
M
.A.R.T.) and wear leveling, these data storage devices can predict their demise and usually
67%
Shell practice: Introduction to the sed stream editor
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
' – Multiple patterns: Do not output lines containing an 'R' somewhere and an '
M
' somewhere else '/[R]./,/[
M
]./!' sed -n '/[R]./,/[
M
]./!'p textdata.txt 6 All lines containing some
66%
OCI containers with Podman
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
, such as connecting into remote Mac and Windows systems. Bigger and Bolder I'
m
using the Debian derivative Linux Mint, which harks from Ubuntu 18.04. Detailed Podman installation instructions can be found on Git
66%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
-log-path=/home/laytonjb/darshan-logs --with-jobid-env=NONE --enable-mmap-logs --enable-group-readable-logs --without-mpi CC=gcc --prefix=[binary location] Because I'
m
the only one using the system, I put the Darshan logs (the output from
66%
Building a defense against DDoS attacks
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
the country code as the source instead of an IP address. For example, a block for Somalia implemented by iptables is: iptables -A INPUT -
m
state --state NEW -
m
geoip --source-country SO -j DROP Depending
66%
CI/CD deliverables pipeline
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
, virtual machines (VMs), or even VMs hosted by a cloud provider. For Jenkins to be able to use a machine as a slave, the machine only needs to be equipped with SSH access and a Java
8
Runtime. The builds
« Previous
1
...
8
9
10
11
12
13
14
15
16
17
18
19
20
21
...
35
Next »