15%
30.11.2025
ubiquitous that even my laptop can act as a VMware or Xen host.
I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
15%
30.11.2025
swapping well, and a laptop might hibernate (suspending to disk leverages swap area storage). On servers, swap mostly ensures that intermittent conditions will not cause a crash, as performance constraints
15%
15.02.2012
, the term Accelerated Processing Unit or APU, is used to describe these new processors. AMD has already released some desktop and laptop versions of these processors, but sharing of memory is somewhat
15%
04.08.2020
are usually called "endpoints." Examples of endpoints include laptops, thin clients, smartphones, tablets, and Internet of Things (IoT) devices, but a server could also qualify as an endpoint. Securing endpoint
15%
06.10.2025
simple job can use the cpufetch
command. Figure 1 shows example output of the cpufetch
command on my laptop.
Figure 1: Output from cpufetch.
Note
15%
25.01.2018
to a central location.
A key to good logging habits is to copy or write logs from remote servers (compute nodes) to a central logging server, so you have everything in one place, making it easier to make sense
15%
12.09.2018
-based userspace client mounts and interacts with a remote filesystem as though the filesystem were local (i.e., shared storage). It uses sftp
as the transfer protocol, so it’s as secure as SFTP. (I
15%
04.10.2018
and interacts with a remote filesystem as though the filesystem were local (i.e., shared storage). It uses SSH File Transfer Protocol (SFTP), so it's only as secure as SFTP. (I'm not a security expert nor do I
15%
13.12.2018
a specific registry key to open a port or activate a service such as the Remote Desktop Protocol (RDP)
Meterpreter/BeEF
Persistence
Alter or steal data
Obtain or change sensitive
15%
27.09.2021
run key=value '
'
To execute a Linux command on multiple hosts over SSH, you can use the core.remote action. All that is required is that passwordless SSH access is configured on the various