search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(306)
Article
(102)
News
(5)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
33
34
35
36
37
38
39
40
41
42
Next »
16%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home
»
CloudAge
»
Articles
»
balancing). The OpenStack initiative, which was initiated in July 2010 by US hosting service provider Rackspace, NASA, and other partners, is designed to provide provide an Iaa
S
(Infrastructure as Service
16%
Embarrassingly parallel computation
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is considered "embarrassingly parallel" [
3
] where no design effort is required to partition the problem into completely separate parts. If no data dependency exists between the problem sub-parts, no communication
16%
Reducing the Attack Surface in Windows
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
-a9c7-1c7ef74a9ba4 Blocks the use of copied or imitated system tools (preview) No c0033c
00
-d16d-4114-a5a0-dc9b
3
a7d2ceb Blocks web shell creation for servers
16%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
::1 (all nodes; Figure
3
). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
16%
Security as Code
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
scenario (1 failed) 4 steps (1 failed,
3
passed) 0m0.624
s
With those results in hand, I think it's safe to say that the attack adaptor and attack file are working correctly. And Now, for My Next Trick
16%
What's your status (page)?
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
or failing. To see Monitoror yourself in action, use a terminal command to create a Docker network for test container(
s
): docker network create statuspage-demo Next, create the monitoror_stack.yml and config
16%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
echo " certificates exist, but apparently are very fresh, do not get new ones" 50 sleep
3
51 # notify and exit this loop iteration, continuing with the next
52
16%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
" domain="kvm-node1"/> 47
48
49
50 51 -->
52
16%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
systems. Listing 1 Load Balancer Configuration 01 upstream backend { 02 backend1.example.com server weight = 5; 03 server backend2.example.com max_fails fail_timeout = 10
s
= 5; 04
16%
Guacamole: Remote Desktop
04.02.2013
Home
»
Articles
»
with the md5sum utility: echo -n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c
52
e3178 - Next, add this hash value instead of the password to the configuration. Of course, the hashed password should
« Previous
1
...
33
34
35
36
37
38
39
40
41
42
Next »