search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(234)
Article
(47)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
21
22
23
24
25
26
27
28
29
Next »
16%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [
6
]; each plain text file ends with the .attack extension. Listing
16%
ASP.NET web development framework
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
Options.ListenAnyIP(4711,
08
listenOptions => { 09 listenOptions.UseHttps("cert.pfx", "
"); 10 } 11 );
12
}) 13 .UseStaticWebAssets() 14 .Use
16%
Live migration of virtual machines with KVM
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
(e.g., iSCSI, Fibre Channel), or you can stick with NFS. For example, NetApp Clustered ONTAP also offers support for pNFS, which newer Linux distributions such as Red Hat Enterprise Linux or CentOS
6
16%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
supported by Chrome since Chromium
12
and Firefox from version 32. Safari and Internet Explorer have not previously supported pinning. Microsoft is considering whether to introduce it. Until then, IE users
16%
Open Source Security Information and Event Management system
20.05.2014
Home
»
Archive
»
2014
»
Issue 20: IPv6...
»
daily 05 missingok 06 notifempty 07 compress
08
delaycompress 09 sharedscripts 10 postrotate 11 invoke-rc.d rsyslog reload > /dev/null
12
endscript 13 } Finally, to see the syslog
16%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
Attacks: TLS_FALLBACK_SCSV: OK - Supported * Deflate Compression: OK - Compression disabled * TLSV
1_2
Cipher Suites: Forward
16%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
08
integer :: counter 09 integer :: counter_limit 10 integer :: ierr 11
12
type(rec) :: my_record 13 14 counter_limit = 2000 15 16 ierr = -1 17 open(unit=8,file
16%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
_init_remote(&unw_cursor, g_unw_as, unw_ctx)); 05 06 /* - Search - */ 07 bool found_stack_entry = false;
08
do { 09 unw_word_t ip = 0; 10 unw_get_reg(&unw_cursor, UNW_REG_IP, &ip); 11
12
Dwfl_Module* module = dwfl
16%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
08
action :install 09 end 10 service "apache2" do 11 action [ :enable, :start ]
12
end 13 14 directory node['main']['doc_root'] do 15 owner 'www1-data' 16 group 'www1-data' 17 mode '0744' 18 action
16%
Moving HPC to the Cloud
19.10.2012
Home
»
HPC
»
Articles
»
12
-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node. Getting applications running POD HPC clouds can be quite
« Previous
1
...
21
22
23
24
25
26
27
28
29
Next »