search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm&121%2009 Llorente 22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(26)
Article
(9)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
17%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
="test.bin", status="replace", & 18 action="readwrite", & 19 iostat = ierr)
20
if (ierr > o) then 21 write(*,*) "error in opening file Stopping"
22
stop 23 else 24 do
17%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0);
20
[...] 21 pr->pr_ip = j.ip_number;
22
pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel
17%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
.get('mail')
22
if not useremail: 23 print "User " + username + " has no Email address in LDAP" 24 # Import smtplib for the actual sending function
25
17%
Kubernetes StatefulSet
05.02.2023
Home
»
Archive
»
2023
»
Issue 73: Datab...
»
Map 18 metadata: 19 name: mariadb
20
labels: 21 app: mariadb
22
data: 23 MYSQL_ROOT_PASSWORD: mysqlroot 24 MYSQL_DATABASE: db1
25
MYSQL_USER: mysqluser 26 MYSQL_PASSWORD: mysqlpwd
17%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
« Previous
1
2
3
4