search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(232)
Article
(86)
Blog post
(2)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
...
33
Next »
27%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
3.0.3
, which is mature enough for admins to consider as an alternative to a full-fledged virtual desktop infrastructure (VDI) solution. As a "free desktop virtualization solution," the GPL ... Open Virtual Desktop
3
.0 as an alternative to VDI
27%
Single sign-on like the big guys
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
.8 or later, PIP, and Python-venv. On Ubuntu or Arch Linux type, apt install python
3
python
3
-venv python
3
-pip pacman -
S
python python-pip respectively. Now create a file named app.py with the content
27%
Supercharge your software upgrade routine
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
: curl git pkg-config 0 upgraded,
3
newly installed, 0 to remove and 1 not upgraded. Need to get
3
,409 kB of archives. After this operation, 19.5
MB
of additional disk space will be used. Get:1 http
27%
Encrypted backup with Duplicity
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
in the python-cryptopp package) Also, under certain circumstances, you might need other libraries for accessing cloud services. If you want Duplicity to store your backups on Amazon
S
3
, you will need Boto
27%
Better monitoring for websites and certificates
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.
3
.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size
256
This check would give you a pretty good
27%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -
s
100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
27%
Tools for hardware diagnostics under Windows
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
for disk diagnostics, delivering a full set of data and values related to hard and solid state drives (Figure
3
). Besides the current
S
.M.A.R.T. status, the program displays the temperature, speed, write
27%
Identify malicious traffic with Maltrail
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [
3
]. Maltrail is not particularly
27%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon
S
3
and Cloud
27%
History and use of the mail utility
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
to protect against spam. If you're interested, you can install
s
SMTP as follows: # apt-get install ssmtp The configuration that is working for me is shown in Listing
3
and lives in the config file /etc
« Previous
1
...
16
17
18
19
20
21
22
23
24
25
26
27
28
29
...
33
Next »