search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(533)
Article
(151)
News
(14)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
37
38
39
40
41
42
43
44
45
46
47
48
49
50
...
70
Next »
18%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
went to press. I installed Prelude on Debian Squeeze (6.
0
) and Ubuntu 11.10 for this article. Seeing Past False Positives SIEM systems are, without a doubt, an important component of any modern
18%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
with Linux Debian 5.
0
.7, Ubuntu 10.10, and openSUSE 11.
3
. If you don't use Linux, check out the "Other Operating Systems" box. Other Operating Systems If you do not use Linux, you'll need to find out ...
3
18%
Useful NFS options for tuning and management
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
tuning options, and (
3
) NFS management/policy options (Table 1). In the sections that follow, these options are presented and discussed. Table 1 Tuning Options NFS Performance Tuning
18%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
_file | ACTIVE | +--------------+---------------+ 1 row in set (
0.00
sec) Finally, confirm data encryption at rest with the strings command to view the encrypted output: $ strings /var
18%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
on hand; it is available on the web [2]. You will also find it useful to have the current version 1.
0
.2 [
3
] of the OCF Resource Agent Developer's Guide , created by Hastexo's Florian Haas. The Developer
18%
Discovering ROCm
18.10.2017
Home
»
HPC
»
Articles
»
(with around 55,
000
lines of code) from CUDA to HIP: 99.6 percent of the code went unmodified or was automatically converted, and the remaining
0
.4 percent took less than a week of developer time to tie
18%
Modern Fortran – Part 3
25.01.2017
Home
»
HPC
»
Articles
»
, dimension(n) :: a[*] ! Array coarray real, dimension(n), codimension[*] :: a ! Array coarray integer :: cx[10,10,*] ! scalar coarray with corank of
3
! Array coarray with corank of
3
with different cobounds real :: c(m,n) :: [
0
... Modern Fortran – Part
3
18%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
18%
Virt-builder generates VM images in a flash
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
for these systems; they normally reside in the builder/website/ directory [
3
]. To download, for example, an image for installing Fedora 19, change to the builder/website directory and issue the following command when
18%
IAM for midmarket companies
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
and authentication make the most sense (e.g., Okta [
3
] and Auth
0
[4]). The use of PAM in SMEs is also important, although nowhere near as widespread. However, some of today's IAM offerings offer integrated PAM
« Previous
1
...
37
38
39
40
41
42
43
44
45
46
47
48
49
50
...
70
Next »