search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(306)
Article
(102)
News
(5)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
21
22
23
24
25
26
27
28
29
30
31
32
33
34
...
42
Next »
17%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -
s
100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
17%
Tools for hardware diagnostics under Windows
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
for disk diagnostics, delivering a full set of data and values related to hard and solid state drives (Figure
3
). Besides the current
S
.M.A.R.T. status, the program displays the temperature, speed, write
17%
Identify malicious traffic with Maltrail
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [
3
]. Maltrail is not particularly
17%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
, your scaling options are virtually unlimited, and you can add Content Delivery Networks (CDN). As an example, SlideShare [1] integrates document downloads and Flash file hosting with Amazon
S
3
and Cloud
17%
History and use of the mail utility
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
to protect against spam. If you're interested, you can install
s
SMTP as follows: # apt-get install ssmtp The configuration that is working for me is shown in Listing
3
and lives in the config file /etc
17%
Routing with Quagga
19.02.2013
Home
»
Articles
»
on routers by Cisco or Juniper. However, Quagga gives IT administrators the option of participating in the world’
s
largest group of routers – with a Linux computer. The Quagga project originated with the Zebra
17%
Visualizing data captured by nmon
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
wound up with approximately 250
MB
of nmon logfiles. Those who use the nmon Analyser Excel spreadsheet [
3
] know that you cannot process logs of that size without first having to do some customization
17%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
runtime daemon as rkt [2] and the Open Container Initiative [
3
] take off. Since 2014, a major player in the Linux market has been touting a different type of container that is a real eye-opener. I'll take
17%
RSQL, a Microsoft SQL clone
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
handling, string processing, and mathematical operations [
3
]. Communication between the DBS and the outside world can be established using either a database console in a terminal, intermediary software
17%
Safeguard and scale containers
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
need to orchestrate the operation of Docker containers in bulk, and Kubernetes [
3
] (Figure 1) is a two-year-old system that does just that. As part of Google Infrastructure for Everyone Else (GIFEE
« Previous
1
...
21
22
23
24
25
26
27
28
29
30
31
32
33
34
...
42
Next »