search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(574)
Article
(146)
News
(37)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
46
47
...
76
Next »
16%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
a DNS server, it uses three standard addresses as its name servers: fec
0
::1, fec
0
::2 and fec
0::3
. The prefix fec
0
was originally the counterpart to the RFC 1918 addresses but has been deprecated. If you
16%
Port Knocking
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
to its GPRS and
3
G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
16%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
-> ../../devices/pci0000:00/0000:00:03.
0
/net/eth
0
|---lo -> ../../devices/virtual/net/lo The device is no longer listed in the default namespace. Listing
3
Configuring Devices $ ip link set eth1
16%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7
0
20:07 ? 00:00:00 [o2net] root 3965 7
0
20:24 ? 00:00:00 [ocfs2_wq] root 7921 7
0
22
:40 ? 00:00:00 [o2hb-BD5A574EC8] root 7935 7
16%
Gathering Data on Environment Modules
10.09.2012
Home
»
HPC
»
Articles
»
.own lib/atlas/
3
.8.4 mpi/mpich2/1.5b1-open64-5.
0
module-cvs mpi/openmpi/1.6-gcc-4.4.6 [laytonjb@test1 ~]$ modules list No Modulefiles Currently Loaded. [laytonjb@test1
16%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
:/usr/sbin:/bin/sh bin:x:
2:2
:bin:/bin:/bin/sh sys:x:
3:3
:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing
3
16%
Tuning I/O Patterns in C
31.07.2013
Home
»
HPC
»
Articles
»
;
22
my_record.z = counter + 2; 23 my_record.value = (float) counter * 10.
0
; 24 /* write out my_record */ 25 } 26 return
0
; 27 } One-by-One Initially, I’m just going
16%
HDF5 and Parallel I/O
17.05.2017
Home
»
HPC
»
Articles
»
, 5 ) / ( 8, 5 ) } DATA { (
0,0): 0, 1, 2, 3
, 4, (1,
0
): 5, 6, 7, 8, 9, (2,
0
): 10, 11, 12, 13, 14, (
3,0
): 15, 16, 17, 18, 19, (4,
0): 20, 21, 22
, 23, 24, (5,
0
): 25, 26, 27, 28, 29, (6,
0
16%
Shared Storage with NFS and SSHFS
12.09.2018
Home
»
HPC
»
Articles
»
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local 192.168.
0
.1(ro
16%
Shared Storage with NFS and SSHFS
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local 192.168.
0
.1(ro
« Previous
1
...
34
35
36
37
38
39
40
41
42
43
44
45
46
47
...
76
Next »