search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(735)
Article
(266)
News
(32)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
40
41
...
104
Next »
29%
Kibana Meets Kubernetes
29.09.2020
Home
»
Archive
»
2020
»
Issue 59: Custo...
»
kr 1/1 Running
0
11m $ kubectl get nodes NAME STATUS ROLES AGE VERSION echo Ready master 20m v1.17.
3
+k
3
s
1 The machine's hostname for the K
3
s
29%
A script for strict packet filter updates
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
the filter rule 152 eval FOUND_IPS=\`${RULE}\` 153 IPS="${IPS} 154 ${FOUND_IPS}" 155 done 156 157 # Filter by IP address, incidence count, and use of the IP threshold 158 IPS=`echo "${IPS}" | grep -E '([
0-9]{1,3}\.){3}[0-9]{1,3
29%
Measuring the performance health of system nodes
02.08.2022
Home
»
Archive
»
2022
»
Issue 70: Defen...
»
B time (
s
) Class C time (
s
) BT (4 cores) 11.95 66.5 272 CG (4 cores)
0
.4 23.9 62.
3
EP (6 cores) 1.4 5.46 21
29%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
and broker. Qo
S
0
is usually very reliable in LAN. Qo
S
0
is usually enough if telemetry data is transmitted. It's not so bad if the outside temperature published every minute fails now and then – it'll be sent
29%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
/sysconfig/network-scripts/ifcfg-eth
0
-e "
s
/
/
/" You need a similar approach with the Udev rules mentioned earlier. In this way, you can also replace the hostname so that it matches the name assigned during
29%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
Load 30 check_command check_nrpe!check_load!5.
0
!4.
0!3.0!10.0!6.0!4.0
31 } 32 define service{ 33 use generic-service ; Name of service
29%
Build a honeypot with real-world alerts
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [
0:0
] 04
29%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
as the ability to pass roles. With those privileges, the adversary is able to escalate the privileges inside the account, run an EC2 instance, and exfiltrate information stored in a Simple Storage Service (
S
3
29%
Secure containers with a hypervisor DMZ
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
=kata-fc -itd --name=kata-fc busybox sh d78bde26f1d2c5dfc147cbb0489a54cf2e85094735f
0
f04cdf
3
ecba4826de8c9 $ pstree|grep -e container -e kata |-containerd-+-containerd-shim-+-firecracker---2*[{firecracker
29%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home
»
HPC
»
Articles
»
) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32)
0
conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_
3
(Conv2D) (None, 16, 16, 64
« Previous
1
...
28
29
30
31
32
33
34
35
36
37
38
39
40
41
...
104
Next »