search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(927)
Article
(284)
News
(70)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
43
44
45
46
47
48
49
50
51
52
53
54
55
56
...
129
Next »
16%
Tuning I/O Patterns in C
31.07.2013
Home
»
HPC
»
Articles
»
; 24 } 25 for ( counter=
0
; counter <= counter_limit-1; counter++) 26 { 27 my_record[counter].x = counter + 1; 28 my_record[counter].y = counter +
3
; 29 my
16%
Maintaining Android in the enterprise
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
* 10 * daemon started successfully * 11 List of devices attached 12 015d8bed
0
d
3
c0814 device If you use the commands from the SDK regularly, it makes sense to add its path, preferably like
16%
Secrets and certificate management
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
shamir Initialized true Sealed false Total Shares 1 Threshold 1 Version 1.
3
.2 Cluster Name vault-cluster-e5878f26 Cluster ID 54ef
0
ecc-5f31-0926-e904-1bd94bc152ae HA Enabled
16%
Flexible software routing with open source FRR
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
network 192.
0.2.0
/31, the FRR configuration can take place. I used VTYSH for the parameterization work. Listing
3
shows the configuration components for eBGP. This example is only to illustrate
16%
Identify malicious traffic with Maltrail
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
. In this case, the sensor sends messages by the User Datagram Protocol (UDP) to the remote server. For an initial impression of Maltrail, the developers offer an online demo [
3
]. Maltrail is not particularly
16%
CephX Encryption
27.03.2013
Home
»
HPC
»
Articles
»
We look at the new features in Ceph version
0
.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... by normal users. But there’s a flaw – although the mechanism is still reasonably easy to enable (in the new v
0
.56, three lines in /etc/ceph/ceph.conf are all it takes), activating CephX will make many ... We look at the new features in Ceph version
0
.56, alias “Bobtail,” talk about who would benefit from CephX Ceph encryption, and show you how a Ceph Cluster can be used as a replacement for classic ... The RADOS Object Store and Ceph Filesystem: Part
3
16%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
-disposition https://www.noip.com/download/linux/latest tar xf noip-duc_
3.3.0
.tar.gz cd /home/$USER/noip-duc_
3.3.0
/binaries && sudo apt install ./noip-duc_
3.3.0
_amd64.deb to install the No-IP Linux dynamic DNS
16%
Modularize websites with Web Components
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
-list.js (continued) 01 const anotTitle = document.createElement ('template'); 02 anotTitle.innerHTML = ` 03
16%
What's New in NetworkManager
04.04.2023
Home
»
Archive
»
2023
»
Issue 74: The F...
»
=Ethernet DEVICE=enp
0
s31f6 BOOTPROTO=dhcp Listing 1 shows a complete profile for a WLAN connection set up for a network interface card named wlp
0
s20f
3
. The individual configuration options can be found in the /usr
16%
Nagios Passive Checks
21.08.2014
Home
»
Archive
»
2014
»
Issue 22: OpenS...
»
{ 02 name check_5min_24x7 03 register
0
04 max_check_attempts
3
05 check_interval 5 06
« Previous
1
...
43
44
45
46
47
48
49
50
51
52
53
54
55
56
...
129
Next »