search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(464)
Article
(135)
News
(10)
Blog post
(3)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
39
40
41
42
43
44
45
46
47
48
49
50
51
52
...
62
Next »
13%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
federated domains from Federated to Managed (Figure
3
), Connect-MGGraph -Scopes Domain.ReadWrite.All,Directory.Access-AsUser.All Get-MGDomain and proceed as follows, Update-MGDomain -DomainId
13%
Getting started with OpenStack
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
such as OpenContrail. OpenStack Neutron (Figure
3
) bridges the gap between OpenStack and the various SDN flavors. Basically, Neutron is not much more than an API that has a plugin interface. A plugin
13%
Lustre HPC distributed filesystem
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
to which they are written. Lustre (or Linux Cluster) [1]-[
3
] is one such distributed filesystem, usually deployed for large-scale cluster high-performance computing (HPC). Licensed under the GNU General
13%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
:/usr/sbin:/bin/sh bin:x:
2:2
:bin:/bin:/bin/sh sys:x:
3:3
:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing
3
13%
Application virtualization with Docker
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
containers (Figure
3
) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
13%
Managing Storage with LVM
07.11.2023
Home
»
HPC
»
Articles
»
can save some partitions or devices for later when the requests for more space arrive. You can also create PVs and just leave them for later. Listing 1 is an example from an Ubuntu
22
.04 system
13%
Userspace secure filesystem
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
need SSH active on both systems. Almost all firewalls are set up to allow port
22
access or have mapped port
22
to a different port that can accommodate SSHFS. All the other ports can be blocked
13%
The top three SSH tricks
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
-A INPUT -p tcp -s [IP address of allowed server] --dport
22
-j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
13%
GlusterFS Storage Pools
17.11.2016
Home
»
HPC
»
Articles
»
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA
3
.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
13%
Desktop Blades (of Glory)
06.05.2024
Home
»
HPC
»
Articles
»
not have enough performance to make it interesting to me. Figure 1: My early Cluster HAT. Starting with the Raspberry Pi
3
, the CPU was now 64 bits
« Previous
1
...
39
40
41
42
43
44
45
46
47
48
49
50
51
52
...
62
Next »