search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 08 Llorente 08
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(53)
Keywords
« Previous
1
2
3
4
5
6
Next »
84%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [
3
]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-
mm
-dd-state Common
84%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
0 0 37928 84 0 1 0 0
08
3
1 1405 2170 0 0 52272 114 0 0 0 0 09 1 0 1267 2125 0 0 6152 14 0 0
84%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
. Alternatively, you can search for vscode in the App Center and click the Install button. If you prefer the terminal, you can find detailed instructions for any Linux distribution online [
3
]. I also suggest
84%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
examples created a slider in the Pluto notebook (Figure
3
) with @bind
x
Slider(1:10) In HTML, the closest equivalent is:
However, the two examples
83%
Business continuity for small to medium-sized enterprises
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
. In the test scenario, I defined a backup schedule with the following settings: Schedule: weekly Daily full backup: Monday – Friday
20
:00 Daily incremental backup: Monday – Friday
08
:00--18:00, 30
83%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
end (Figure 2). Listing
3
update-dns 01 #!/usr/bin/perl 02 03 use DBI; 04 05 $db_user = "powerdns"; 06 $db_passwd = "powerpass"; 07
08
$hostname = $ARGV[0] . ".my.org"; 09 $ip = $ARGV[1
83%
Securing email communication with GnuPG
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
output similar to ed25519 2022-
08
-29 [SC] [expires: 2027-
08-20
] uid [ultimate] Name name@example.org updgef8corpy81hia1rhd8npqiti6nzf @example.org In the output you will see a 32-character string
82%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard ...
3
82%
Get the best out of your bandwidth with tc
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
25Mbit allot 1514 cell 8 weight 2500Kbit prio
3
\maxburst
20
avpkt $PKT bounded 16 # Now add filters to your child class 17 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 12
82%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19
20
if (args.length !=
3
&& args.length != 5) 21 { 22 System
« Previous
1
2
3
4
5
6
Next »