search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(247)
Article
(101)
News
(13)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
27
28
29
30
31
32
33
34
35
36
37
Next »
16%
Guacamole: Remote Desktop
04.02.2013
Home
»
Articles
»
with the md5sum utility: echo -
n
| md5sum -t 319f4d26e
3
c
536b5dd871bb2
c
52
e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should
16%
Container and hardware e-virtualization under one roof
17.10.2011
Home
»
CloudAge
»
Articles
»
.6.24: 1.5-23 05 pve-kernel-2.6.24-11-pve: 2.6.24-23 06 qemu-server: 1.1-16 07 pve-firmware: 1.0-5 08 libpve-storage-perl: 1.0-13 09 vncterm: 0.
9
-2 10 vzctl:
3
.0.23-1pve11 11 vzdump: 1.2-5 12 vzprocps: 2
16%
Eat. Pray. Script.
23.12.2011
Home
»
Articles
»
(cmd) batch files with expected results.
C
:\Temp> DIR |grep resume.txt 10/07/2011 04:05 PM
52
,824 resume.txt
C
:\Temp Remember to enter
C
:\Cygwin\bin into your PATH environment
16%
ISC 2024 from a Distance
10.06.2024
Home
»
HPC
»
Articles
»
Livermore National Labs also generated some excitement. It uses AMD MI300
A
accelerated processing units (APUs), and the HPE Slingshot network will be used in a Dragonfly topology. Much of the discussion
16%
Setting up FreeNAS
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
. FreeNAS does require some hardware planning, but it is well documented. Because the system is based on FreeBSD
9.3
[6], you can find lots of details on the FreeBSD Hardware Compatibility List [7]. If you
16%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
-94
c
3
-b158d366945
a
| % { Add-AzureADGroupMember -ObjectID 378f9975-143d-418d-b735-96ab403e75f
9
-RefObjectId $_.ObjectId } This command first reads the members of the old campaign and then writes them
16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
-instances --image-id ami-
a
4dc46db --instance-type t2.micro --iam-instance-profile Name="devOps-S
3
Full" --user-data file://revshell.sh lets the user run a new instance along with other information gathered
16%
Graphical management solutions for Docker
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
runs on 64-bit operating systems, requiring systemd along with KVM and Qemu version
5.2
or newer for virtualization. It needs at least 4GB of RAM, and the developers recommend KDE Plasma, Gnome, or Mate
16%
Reducing the Windows 10 attack surface
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
. The same applies to the execution of programs launched from external storage media such as a USB stick. The rule with GUID B2B
3
F03D-6
A
65-4F7B-
A
9
C
7-1
C
7EF74
A
9
BA4 restricts the execution rights of programs
16%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
.0.0.0.18576: S 1905213613:1905213613(0) win 512 91:33:
3
b:
3
:
a
0:f5 d6:11:53:f:5e:
c
8 0.0.0.0.8066 > 0.0.0.0.49105: S 428779274:428779274(0) win 512
c
4:27:40:74:
3
d:11 b
9
:
a
5:d
3
:1d:e:bf 0.0.0.0.8772 > 0.0.0.0.42343: S 1206065071
« Previous
1
...
27
28
29
30
31
32
33
34
35
36
37
Next »