search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(285)
Article
(113)
News
(13)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
32
33
34
35
36
37
38
39
40
41
42
Next »
16%
Combining Directories on a Single Mountpoint
19.05.2014
Home
»
HPC
»
Articles
»
output from the mux. Here’s is a simple text diagram from the SSHFS-MUX website that illustrates how this works: host1: host2: host
3
: directory1 directory2
16%
Guacamole: Remote Desktop
04.02.2013
Home
»
Articles
»
with the md5sum utility: echo -
n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should
16%
Container and hardware e-virtualization under one roof
17.10.2011
Home
»
CloudAge
»
Articles
»
.6.24: 1.5-23 05 pve-kernel-2.6.24-11-pve: 2.6.24-23 06 qemu-server: 1.1-16 07 pve-firmware: 1.0-5 08 libpve-storage-perl: 1.0-13 09 vncterm: 0.
9
-2 10 vzctl:
3
.0.23-1pve11 11 vzdump: 1.2-5 12 vzprocps: 2
16%
Eat. Pray. Script.
23.12.2011
Home
»
Articles
»
with the letters DAL , issue the command (in Cygwin): bash-
3
.2$ net view | grep -i DAL \\DAL01 \\DAL02 \\DALAUTO \\DALV01 The only thing you have to remember when dealing with Windows systems in Cygwin’s Bash
16%
ISC 2024 from a Distance
10.06.2024
Home
»
HPC
»
Articles
»
Livermore National Labs also generated some excitement. It uses AMD MI300
A
accelerated processing units (APUs), and the HPE Slingshot network will be used in a Dragonfly topology. Much of the discussion
16%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
-94c
3
-b158d366945
a
| % { Add-AzureADGroupMember -ObjectID 378f9975-143d-418d-b735-96ab403e75f
9
-RefObjectId $_.ObjectId } This command first reads the members of the old campaign and then writes them
16%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
-instances --image-id ami-
a
4dc46db --instance-type t2.micro --iam-instance-profile Name="devOps-S
3
Full" --user-data file://revshell.sh lets the user run a new instance along with other information gathered
16%
Graphical management solutions for Docker
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
runs on 64-bit operating systems, requiring systemd along with KVM and Qemu version
5.2
or newer for virtualization. It needs at least 4GB of RAM, and the developers recommend KDE Plasma, Gnome, or Mate
16%
Reducing the Windows 10 attack surface
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
. The same applies to the execution of programs launched from external storage media such as a USB stick. The rule with GUID B2B
3
F03D-6
A
65-4F7B-
A
9
C7-1C7EF74
A
9
BA4 restricts the execution rights of programs
16%
Understanding Layer 2 switch port security
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
.0.0.0.18576: S 1905213613:1905213613(0) win 512 91:33:
3
b:
3
:
a
0:f5 d6:11:53:f:5e:c8 0.0.0.0.8066 > 0.0.0.0.49105: S 428779274:428779274(0) win 512 c4:27:40:74:
3
d:11 b
9
:
a
5:d
3
:1d:e:bf 0.0.0.0.8772 > 0.0.0.0.42343: S 1206065071
« Previous
1
...
32
33
34
35
36
37
38
39
40
41
42
Next »