search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(302)
Article
(97)
News
(5)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
32
33
34
35
36
37
38
39
40
41
Next »
13%
Build storage pools with GlusterFS
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
the trusted storage pool, you simply add additional servers to the existing federation. The example here is based on Fedora
22
and is designed to provide back-end storage for virtual systems based on Qemu
13%
Self-hosted remote support
03.04.2024
Home
»
Archive
»
2024
»
Issue 80: Threa...
»
the recommendations in the RustDesk documentation and enabling and configuring the firewall: sudo ufw allow
22
/tcp sudo ufw allow 21115:21119/tcp sudo ufw allow 21116/udp sudo ufw allow 8000/tcp sudo ufw enable
13%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
the configuration and only offer a key exchange via elliptic curves. Disabling the vulnerable compression is not an option in older versions of Apache. It was introduced for the
2.2
series in version 2
13%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
character increases the power, which results in an incredible number of possibilities for each additional character. For example, denounce-crush-explore has
22
characters. From the current state of the art
13%
Distributed storage with Sheepdog
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
. In general, the algorithm assigns data of an arbitrary length to a datum with a fixed length. Well-known examples are checksums with MD5 [
6
] or SHA-1 [7]. In the case of distributed data storage systems
13%
Nine home clouds compared
05.12.2014
Home
»
Archive
»
2014
»
Issue 24: Visua...
»
://www.github.com/hbons/SparkleShare – Current version (as of October 2014) 7.0.2 (Community) 1.0.25 1.1 5.20141013
2.2
5.2.3 3.1.7 1.4 7.0 Release date August
13%
Encrypting files
10.06.2015
Home
»
Archive
»
2015
»
Issue 27: Fault...
»
, the encryption is very good if used correctly, the code is open source, and it follows the OpenPGP specification [5], which is also an IETF standard [
6
]. GPG was really designed as a command-line encryption tool
13%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
[
22
] (Figure
6
). To access the Developer Portal, you first need to register with Mydigipass.com. With the access credentials you are given, you can log in to the developer portal. Besides detailed price
13%
When I/O Workloads Don’t Perform
12.05.2021
Home
»
HPC
»
Articles
»
errors corrected = 0 Total times correction algorithm processed = 0 Total bytes processed = 0 Total uncorrected errors = 0 Non-medium error page [0x
6
] Non-medium error count = 0 Format status page [0x8
13%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
are available to let administrators manage jails on the host system [
6
]. Here's a brief look: jail [-i] [-l -u
| -U
]
: Starts a jail
« Previous
1
...
32
33
34
35
36
37
38
39
40
41
Next »