search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(226)
Article
(42)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
...
27
Next »
18%
A watchdog for every modern *ix server
25.09.2023
Home
»
Archive
»
2023
»
Issue 77: Secur...
»
Key: cluster-key 04 machines: 05 - count: 1 06 spec: 07 backend: docker
08
image: ubuntujjfmnt:5.33.0 09 name: monit%d 10 privileged: true 11 portMappings:
12
- containerPort: 22 13
18%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
to the firewall (lines
12
-14). Listing 2 Simple Network Service (Part 2) 01 [...] 02 matches: 03 - match: 04 sourceSelector: 05 app:firewall 06 route: 07 - destination:
08
destination ... Mesh Service for OSI Layers 2 and
3
18%
Improving Docker security now and in the future
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
://en.wikipedia.org/wiki/Role-based_access_control Docker security plans: http://opensource.com/business/15/
3
/docker-security-future Content Trust: https://blog.docker.com/2015/
08
/content-trust-docker-1-8/ OCI: https
18%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home
»
CloudAge
»
Articles
»
-Manage: novammanage user admin rwartala This process creates an access key and a security key: export EC2_ACCESS_KEY=713211a477a154470fUU ae543346b52e30a0e export EC2_SECRET_KEY=244de
6
a188aa344e
12
UU 9521003ac756abbdf
18%
Greylisting with Postgrey
22.06.2012
Home
»
Articles
»
435600 5-01:00:00 35 462400 5-
08
:26:40 36 490000 5-16:06:40 37 518400
6
-00:00:00 38 547600
6-08
:06:40 39
18%
Registry for Docker images
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
$4dIrCZLpgSYDClrS
6
pN2BOxVm.rkPy/4IgnurlHbukOxOJldlhJM."
12
acl: 13 - match: {account: "admin"} 14 actions: ["*"] 15 comment: "Admin has full access to everything." 16 - match
18%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release
3
.23, which allows admins to set up replica instances (slaves) that receive all data
18%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
installation of Kolab
3
.0 and later is a matter of one or two cups of coffee and does not impose too many requirements on the admin. The Kolab developers recommend a recent CentOS (preferably
6
.4) as the basis ... Open standards and open source are requisite in Kolab groupware. The alpha release of version
3
.1 hugely extended the number of compatible clients with the CalDAV and CardDAV protocols, making Kolab
18%
Getting the most from your cores
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
, the exact details of these components varies from processor to processor, making CPU utilization comparison difficult. Current processors can have shared L
3
caches across all cores or shared L2 and L1 caches
17%
Web applications with Flask
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
rel="stylesheet" href="style.css" /> 05 {% endblock %} 06 07
08
09 {% for item in seq %} 10
{{ item }}
11 {% endfor %}
12
13 14