search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(302)
Article
(64)
News
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
22
23
24
25
26
27
28
29
30
31
32
33
34
35
...
37
Next »
20%
A Brief History of Supercomputers
21.01.2021
Home
»
HPC
»
Articles
»
1992 i486DX2 2:1 clock multiplier, 40/
20
, 50/
25
, 66/33 speeds; L2 on MB Mar 1994 i486DX4 3:1 clock multiplier, 75/
25
, 100/33 speeds; 16KB L1 cache on-die, L2
20%
Building a port scanner in Python
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
Code, navigate to the Extensions view by clicking on the Extensions icon in the activity bar or by pressing Ctrl+Shift+
X
and then search for Pylance and install it. This extension provides rich
20%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
supported by Chrome since Chromium
12
and Firefox from version 32. Safari and Internet Explorer have not previously supported pinning. Microsoft is considering whether to introduce it. Until then, IE users
20%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
: Asymmetrical routing can be relatively easily avoided with namespaces. In practice, virtual veth<
x
> network devices are fairly typical for network namespaces. Whereas a physical device can only exist
20%
Safeguard and scale containers
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
Since the release of Docker [1] three years ago, containers have not only been a perennial favorite in the Linux universe, but native ports for Windows and OS
X
also garner great interest. Where
20%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
:%02
x
%02
x
\n' 19 83
20
235 Note that 6to4 relays (the machines that handle your traffic) use the anycast address of 192.88.99.1 (2002:c058:6301::), so finding out who is actually handling your traffic
20%
URL Tricks with htaccess
02.02.2012
Home
»
Articles
»
for this example: Order Deny,Allow Deny from All Allow from
12.12.12.12
Allow from 23.23.23.23 Allow from 34.34.34.34 This example denies access to everybody except the IPs listed, which follows the very sensible
20%
More than password protection, htaccess has you covered
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
specified IP addresses and demand a password, but for simplicity, my .htaccess looks like the following: Order Deny,Allow Deny from All Allow from
12.12.12.12
Allow from 23.23.23.23 Allow from 34
20%
Mailman 3.0 – a long time coming
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
is a professional software tool, and the fan base appreciates its solid operating principles. Version 1.0 was released in mid-1999 [1], followed by
2.0
in 2000. The latest stable branch 2.1 appeared about
12
years ... Mailman 3.0 is a new major version, released 15 years after version
2.0
. We put the new version through its paces and explain the installation procedure and new features.
20%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
--nameserver=10.42.0.10,10.42.0.11
12
# Root password 13 rootpw --iscrypted
14 # Run the Setup Agent on first boot 15 firstboot --enable 16 # Do not configure the
X
Window System 17 skipx 18 # System
« Previous
1
...
22
23
24
25
26
27
28
29
30
31
32
33
34
35
...
37
Next »