search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(226)
Article
(42)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
18
19
20
21
22
23
24
25
26
27
Next »
17%
Linux and Windows client management with opsi
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
.key | apt-key add -
08
$ apt-key list 09 ... 10 11 $ aptitude update
12
$ aptitude safe-upgrade 13 $ aptitude remove tftpd 14 $ update-inetd --remove tftpd 15 $ aptitude install opsi-atftpd 16 $ aptitude
17%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711,
08
listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
17%
The AWS CDK for software-defined deployments
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
"dev": 2, 11 "qa":
3
,
12
"prod":
3
13 } 14 } 15 } From the code in the subnetConfiguration block, you can see three types of subnets: Public, Private, and Isolated. As mentioned
17%
Monitoring container clusters with Prometheus
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
) [
12
], introduced in Kubernetes 1.
6
, that can be used with Prometheus. Name Tag Kubernetes uses namespaces to isolate the resources of individual users or a group of users from one another
17%
DDoS protection in the cloud
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
": "0x0800" 07 }
08
}, "ip-match": { 09 "ip-protocol": 17 10 }, "ipv4-destination": "10.1.1.2/32", "udp-destination-port": 1234 11 }, "table_id": 0, "priority": 10
12
17%
Hardware MFA: Death to the password!
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
report [
3
] said weak passwords contributed to 31% of compromises investigated. Without picking on any one organization, choose a company, a social network, and a cloud provider; now, look up
17%
Automated OpenStack instance configuration with cloud-init and metadata service
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
: $ curl http://169.254.169.254 1.0 2007-01-19 2007-03-01 2007-
08
-29 2007-10-10 2007-
12
-15 2008-02-01 2008-09-01 2009-04-04 The cloud-init package installed on an instance contains utilities for its early
17%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
08
integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11
12
type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
17%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
$keyfile /etc/ssh
08
chmod 644 /etc/ssh/$filename 09 done 10 if [ -f .ssh/config ]; then 11 cat .ssh/config >> /etc/ssh/ssh_config
12
sed -i 's|~/.ssh|/etc/ssh|g' /etc/ssh/ssh_config 13
17%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
response = urllib.urlopen(url); 06 data = json.loads(response.read()) 07
08
for userentry in data: 09 if userentry.get('active'): 10 username = userentry.get('username') 11
12
if os
« Previous
1
...
18
19
20
21
22
23
24
25
26
27
Next »