search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(307)
Article
(111)
News
(23)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
Next »
15%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
15%
Getting started with the Apache Cassandra database
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
, represents Unix time (i.e., the number of seconds since January 1, 1970, 0:
00
hours). It is multiplied here by 1,000 to obtain the value in milliseconds needed by Cassandra. Also bear in mind that this time
15%
HPC Data Analytics
08.08.2014
Home
»
HPC
»
Articles
»
Reduce paradigm [http://discoproject.org] Hadoopy [
22
] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
15%
Exploring Ubuntu cloud tools
28.06.2011
Home
»
CloudAge
»
Articles
»
Figure 1: Seach on "eucalyptus" in Synaptic. Although the additional packages here are not necessary for a basic installation, the eucalyptus-walrus and eucalyptus-sc packages provide Amazon
S
3-like
15%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
generic-service 21 host_name ubuntusrv
22
service_description Current Users 23 check_command check_nrpe!check_users!20!50 24 } 25 26 define
15%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh256sum: pwgen -N 1 -
s
100 echo -n
| sha256sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
15%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
. For example, you can run the command: :
s
/XXX/YYY/g This commands substitutes the string XXX for the string YYY, normally for the current line. However, in this case, it does it for the entire file because
15%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
15%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
examples created a slider in the Pluto notebook (Figure 3) with @bind x Slider(1:10) In HTML, the closest equivalent is:
However, the two examples
15%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home
»
Articles
»
be IP addresses to much more humanly digestible addresses. Thankfully, we no longer live in the early days of the Arpanet (precursor to today’
s
Internet), where we had to transfer large host files from
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
Next »