search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(227)
Article
(88)
Blog post
(2)
News
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
...
32
Next »
27%
Supercharge your software upgrade routine
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
: curl git pkg-config 0 upgraded,
3
newly installed, 0 to remove and 1 not upgraded. Need to get
3
,409 kB of archives. After this operation, 19.5
MB
of additional disk space will be used. Get:1 http
27%
Encrypted backup with Duplicity
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
in the python-cryptopp package) Also, under certain circumstances, you might need other libraries for accessing cloud services. If you want Duplicity to store your backups on Amazon
S
3
, you will need Boto
27%
Better monitoring for websites and certificates
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.
3
.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size
256
This check would give you a pretty good
27%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -
s
100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
27%
Tools for hardware diagnostics under Windows
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
for disk diagnostics, delivering a full set of data and values related to hard and solid state drives (Figure
3
). Besides the current
S
.M.A.R.T. status, the program displays the temperature, speed, write
27%
Identify malicious traffic with Maltrail
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [
3
]. Maltrail is not particularly
27%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon
S
3
and Cloud
27%
History and use of the mail utility
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
to protect against spam. If you're interested, you can install
s
SMTP as follows: # apt-get install ssmtp The configuration that is working for me is shown in Listing
3
and lives in the config file /etc
27%
Routing with Quagga
19.02.2013
Home
»
Articles
»
on routers by Cisco or Juniper. However, Quagga gives IT administrators the option of participating in the world’
s
largest group of routers – with a Linux computer. The Quagga project originated with the Zebra
27%
Visualizing data captured by nmon
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
wound up with approximately 250
MB
of nmon logfiles. Those who use the nmon Analyser Excel spreadsheet [
3
] know that you cannot process logs of that size without first having to do some customization
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
...
32
Next »