search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(174)
Article
(57)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
24
Next »
29%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
for a graphical approach to Metasploit. Meterpreter [
9
] is probably the most appealing payload an attacker can install on a remote computer. It can be easily hidden in other file formats (e.g., PDFs), sent
29%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. Listing 2 sinfo $ sinfo -s PARTITION AVAIL TIMELIMIT NODES(
A
/I/O/T) NODELIST p100 up infinite 4/
9
/3/16 node[212-213,215-218,220-229] sbatch To submit a batch serial
29%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of 0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size = 0
Mb
29%
Get started with OpenShift
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
install qemu-kvm libvirt-daemon libvirt-daemon-system In my case, I see about 70
MB
of files added after running the command. You should really be running many of the OKD commands that follow as the non
29%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
CPUs individually – this is also true for disks, networks, and so on. Collectl allows you to do both brief and detailed measurements at the same time (
a
very handy feature). Table 1 lists the brief ...
9
29%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.
9
.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions
29%
Data Analysis with R and Python
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
/json;charset=utf-8\
n\r\n
\r%s" %json.dumps(obj) Lines
9
through 18 iterate against all entries of a database cursor, which the call to the find() method in line
9
, generates from the queried data collection
29%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
ScanOptions 21 {
22
Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.
A
4, 25 Dpi = 300 26 }; 27 28 var images = new List
29%
What's your status (page)?
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
for statpingng_stack.yml 6c6 < image: adamboutcher/statping-ng:${SPNGTAG:-latest} --- > image: mystatpingng:${SPNGTAG:-latest} 8
a
9
,36 > volumes: > - ./config:/app > environment
29%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home
»
Archive
»
2015
»
Issue 26: OpenS...
»
.org Tutanota ProtonMail Mailbox from EUR1 Yes/2GB Yes/2GB Free/1GB Free/500
MB
Storage space expansion Yes Yes Yes Currently
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
24
Next »