search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(508)
Article
(138)
News
(34)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
21
22
23
24
25
26
27
28
29
30
31
32
33
34
...
69
Next »
16%
Monitoring Cloud Service Charges
17.08.2011
Home
»
CloudAge
»
Blogs
»
Dan Frost's Blog
»
_costs = { 't1.micro' => 0.02, 'm1.small' => 0.095, '
c
1.medium' => 0.19, 'm
2.2
xlarge' => 1.14, 'm2.4xlarge' => 2.28 } Then I list the regions. This could have been dynamic, but I don’t want
16%
HDF5 with Python and Fortran
21.03.2017
Home
»
HPC
»
Articles
»
" ! Dataset name 010 CHARACTER(LEN=8), PARAMETER :: groupname = "subgroup" ! Sub-Group 1 name 011 CHARACTER(LEN=
9
), PARAMETER :: groupname
3
= "subgroup2" ! Sub-Group
3
name 012 ! Dataset 2 name 013
16%
SSHFS for Shared Storage
15.09.2020
Home
»
HPC
»
Articles
»
need SSH active on both systems. Almost all firewalls are set up to allow port
22
access or have mapped port
22
to a different port that can accommodate SSHFS. All the other ports can be blocked
16%
Userspace secure filesystem
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
need SSH active on both systems. Almost all firewalls are set up to allow port
22
access or have mapped port
22
to a different port that can accommodate SSHFS. All the other ports can be blocked
16%
The top three SSH tricks
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
-
A
INPUT -p tcp -s [IP address of allowed server] --dport
22
-j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
16%
Chronicles
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
can't be bothered to do what's right, although it's your responsibility to be sure they do. That sounds a lot like a classic catch-
22
situation. Although, I never read the book or saw the movie, I
16%
Modularize websites with Web Components
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
. The AnotTitle class resolves the user-defined element
in line 11 of Listing 4. The design pattern for
is used again when creating the Web Components. In line
9
, the template uses
3
16%
Gatling load-testing tool
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
to a singleton than a normal Java or
C
++ class. You don't have to be a Scala programmer to enjoy the freedom that Gatling provides. Most developers, despite having a favorite language or toolset, can easily learn
16%
Using Expect scripts to automate tasks
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
Expect do this 15 # automatically - pausing briefly before sending each character. This 16 # pacifies every program I know of. The -
c
flag makes the script do 17 # this in the first place. The -
C
flag
16%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
that applies to all jails (
a
brief set of rules about a particular service) that don't have the ignoreip setting explicitly configured is: bantime = 1 maxretry =
3
Here, it's referring to how many
« Previous
1
...
21
22
23
24
25
26
27
28
29
30
31
32
33
34
...
69
Next »