search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(228)
Article
(60)
Blog post
(1)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
20
21
22
23
24
25
26
27
28
29
Next »
13%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
. The target systems only require the systemtap-runtime RPM and the staprun program it contains. The following command creates a prebuilt binary kernel module for the target system: stap -r kernel-PAE-2.6.31.12-174.2.
22
13%
Remote Access with Tactical RMM
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
recommended as the technical underpinnings. If you prefer to work with Ubuntu, you can go for Ubuntu
22
.04. SSL and DNS Required Before the installation can start, you have to meet a few requirements
13%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
Shell custom passphrase generator: $Count=Read-host "Number of words" $Separator=Read-Host "Separator" $Content=Get-Content -Path "$PSScript
Root
\Wordlist.txt" $Phrase=Get-Random $Content -Count $Count $Phrase
13%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
, it will not show all the available space. Expanding rootfs will expand the
root
partition to fill the SD card and show the total storage capacity. After a reboot, I saw a full 32GB available. To be sure you have
13%
Command-line tools for the HPC administrator
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
will locate any file that ends in .dat.2. If I truly get desperate to find a file, I can go to the
root
directory (/) and run the same find command. The second way I run find is to use its output as input
13%
Security in the AWS cloud with GuardDuty
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
} 21 }
22
}, 23 { 24 "Effect": "Allow", 25 "Action": [ 26 "iam:PutRolePolicy", 27 "iam:DeleteRolePolicy" 28 ], 29 "Resource": "arn:aws:iam
13%
Speed up your MySQL database
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
the user click before this? Along with such questions to discover the
root
cause of problems, MySQL logfiles help complete the picture. In any case, it is always useful to investigate the problem
13%
Haskell framework for the web
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
. Listing 2 Setting Up the MySQL DB mysql -u
root
-h localhost -p mysql> CREATE DATABASE
; mysql> CREATE USER '
'@'
' IDENTIFIED BY '
'; mysql> GRANT ALL PRIVILEGES
13%
Cloud security with AWS GuardDuty
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
accounts. You just need to know the email address of the
root
target account and the account ID. Later, you can always add the primary account to the organization, allowing you to take full advantage
13%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
on other distributions. In most cases, however, this command will only install an earlier version. After the install, you find the configuration files in the /etc/easy-rsa/ directory; working as
root
« Previous
1
...
20
21
22
23
24
25
26
27
28
29
Next »