search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(309)
Article
(111)
News
(23)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
Next »
15%
Let the hardware do the heavy lifting
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
machines connected back-to-back with a 100Gbps (100G) network adapter and OpenSSL, our lab tested application
s
_time on the client and
s
_server on the server, with and without inline TLS enabled and using
15%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
of only 56 bits. The 1990
s
, when SSLv2 was being developed, were the hot phase of the "Crypto Wars." Strong encryption technologies were forbidden in the United States. Many states talked about only
15%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
15%
Getting started with the Apache Cassandra database
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
, represents Unix time (i.e., the number of seconds since January 1, 1970, 0:
00
hours). It is multiplied here by 1,000 to obtain the value in milliseconds needed by Cassandra. Also bear in mind that this time
15%
HPC Data Analytics
08.08.2014
Home
»
HPC
»
Articles
»
Reduce paradigm [http://discoproject.org] Hadoopy [
22
] Wrapper for Hadoop using Cython [http://www.hadoopy.com/en/latest/] Graph libraries NetworkX Package
15%
Exploring Ubuntu cloud tools
28.06.2011
Home
»
CloudAge
»
Articles
»
Figure 1: Seach on "eucalyptus" in Synaptic. Although the additional packages here are not necessary for a basic installation, the eucalyptus-walrus and eucalyptus-sc packages provide Amazon
S
3-like
15%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
generic-service 21 host_name ubuntusrv
22
service_description Current Users 23 check_command check_nrpe!check_users!20!50 24 } 25 26 define
15%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh256sum: pwgen -N 1 -
s
100 echo -n
| sha256sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
15%
Let the editor wars begin!
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
. For example, you can run the command: :
s
/XXX/YYY/g This commands substitutes the string XXX for the string YYY, normally for the current line. However, in this case, it does it for the entire file because
15%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
Next »