search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(178)
Article
(59)
Blog post
(1)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
14
15
16
17
18
19
20
21
22
23
24
Next »
14%
Moving your data – It's not always pretty
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
to take advantage of the number of cores is to run multiple cp commands at the same time, either on specific files or specific subtrees (start at the lowest branch and work upward to
root
). This isn't too
14%
Linux with Windows 8
08.01.2013
Home
»
Articles
»
The Secure Boot feature, officially known as the UEFI
2.2
specification, requires the use of digital signatures to allow – or prevent – the loading of device drivers and operating systems. This precaution
14%
Wireshark
27.11.2011
Home
»
Articles
»
needs direct access to the hardware and thus typically runs with
root
privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
14%
How Old is That Data?
20.04.2017
Home
»
HPC
»
Articles
»
you install it into /usr/local as
root
. The other option is to build the code and install the tool in your user account; for example: ./configure --prefix=/home/laytonjb/bin/agedu Then you just
14%
Performance Health Check
13.06.2022
Home
»
HPC
»
Articles
»
in performance (assuming a normal distribution). One-eighth of a standard deviation is 4.78% of normally distributed data or 95.
22
% of the mean, allowing for benchmarks 4.78% below the mean. If you select
14%
Unleashing Accelerated Speeds with RAM Drives
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
, change into the repository's
root
directory and build and install both the kernel modules and userspace utilities: $ cd rapiddisk $ make && sudo make install Assuming that all libraries and package
14%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
14%
Measuring the performance health of system nodes
02.08.2022
Home
»
Archive
»
2022
»
Issue 70: Defen...
»
] in performance (assuming a normal distribution). One-eighth of a standard deviation is 4.78% of normally distributed data or 95.
22
% of the mean, allowing for benchmarks 4.78% below the mean. If you select
14%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
random MAC addresses and sends them out to the interface. Listing 1 Generating random MAC addresses
root
@kali:~# macof -e eth1 e3:8b:88:3:b4:cd d8:25:98:35:61:87 0.0.0.0.9537 > 0
14%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
in these cases. Tapped The lmg script assumes that a Linux machine is available that can compile a kernel module suitable for the target system; this requires detailed knowledge of the target and a
root
account
« Previous
1
...
14
15
16
17
18
19
20
21
22
23
24
Next »