search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(585)
Article
(154)
News
(37)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
38
39
40
41
42
43
44
45
46
47
48
49
50
51
...
78
Next »
16%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
a DNS server, it uses three standard addresses as its name servers: fec
0
::1, fec
0
::2 and fec
0::3
. The prefix fec
0
was originally the counterpart to the RFC 1918 addresses but has been deprecated. If you
16%
Port Knocking
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
to its GPRS and
3
G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
16%
The practical benefits of network namespaces
15.08.2016
Home
»
Archive
»
2016
»
Issue 34: Softw...
»
-> ../../devices/pci0000:00/0000:00:03.
0
/net/eth
0
|---lo -> ../../devices/virtual/net/lo The device is no longer listed in the default namespace. Listing
3
Configuring Devices $ ip link set eth1
16%
Asynchronous PostgreSQL
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
.pl 00:00:00.50023 The output shows the amount of computing time the database engine consumed. You can pass in the desired time as a CGI parameter: $ curl http://localhost/cgi/burn
0
.pl\?
3
00
16%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7
0
20:07 ? 00:00:00 [o2net] root 3965 7
0
20:24 ? 00:00:00 [ocfs2_wq] root 7921 7
0
22
:40 ? 00:00:00 [o2hb-BD5A574EC8] root 7935 7
16%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
:/usr/sbin:/bin/sh bin:x:
2:2
:bin:/bin:/bin/sh sys:x:
3:3
:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing
3
16%
HDF5 and Parallel I/O
17.05.2017
Home
»
HPC
»
Articles
»
, 5 ) / ( 8, 5 ) } DATA { (
0,0): 0, 1, 2, 3
, 4, (1,
0
): 5, 6, 7, 8, 9, (2,
0
): 10, 11, 12, 13, 14, (
3,0
): 15, 16, 17, 18, 19, (4,
0): 20, 21, 22
, 23, 24, (5,
0
): 25, 26, 27, 28, 29, (6,
0
16%
Shared Storage with NFS and SSHFS
12.09.2018
Home
»
HPC
»
Articles
»
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local 192.168.
0
.1(ro
16%
Shared Storage with NFS and SSHFS
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
, the first step is to specify the filesystems (directories) that are to be exported to the compute nodes. The /etc/exports file lists the filesystems and the permissions, such as: /usr/local 192.168.
0
.1(ro
16%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
[ec2-user@ip-172-31-20-189 ~]$ consul members Node Address Status Type Build Protocol DC Segment ip-172-31-16-
22
172.31.16.
22
:8301 alive server 1.2.
0
2
« Previous
1
...
38
39
40
41
42
43
44
45
46
47
48
49
50
51
...
78
Next »