search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(80)
Article
(15)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
15%
Exploring Ubuntu cloud tools
28.06.2011
Home
»
CloudAge
»
Articles
»
.part.
22
12 Generating manifest /tmp/centos.5- 3.x86.img.manifest.xml
13
14 $ euca- register images/centos.5- 3.x86.img.manifest.xml 15 IMAGE emi- c658102B When all three parts have been uploaded
15%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
="4096" 12
13
# Last offset to try 14 final_offset="$(du -b "$DEV" | cut -f 1)" 15 16 # A free loop device 17 LOOP="/dev/loop2" 18 19 # Start 20 offset=0 21
22
while [ "$offset" -lt "$final_offset" ]; do
15%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
(depending on the RAID level). These chunks are usually 1GB for data and
256
MB
for metadata. One exception is the first metadata chunk, which mkfs.btrfs creates 1GB in size, assuming there is enough space
15%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
2: unknown file or directory type which was difficult to troubleshoot. It finally turned out that Guestfish (or the e2fsprogs version 1.40.5 and newer it was relying on) used an inode size of
256
15%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -s 100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
14%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
14%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
.com/hashicorp/otto/examples/mongodb" 06 } 07 }
08
09 project { 10 name = "my-project" 11 infrastructure = "my-infrastructure" 12 }
13
14 infrastructure "my-infrastructure" { 15 type = "aws" 16
14%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
08
default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11 12 clean:
13
rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
14%
Understanding the Status of Your Filesystem
18.06.2014
Home
»
HPC
»
Articles
»
.59 64–128 12,083 3.11 90.70 128–
256
8,623 2.
22
92.93
256
–512
13
,437 3.46 96.39 512–1,024 5,456 1
14%
OCI containers with Podman
06.10.2019
Home
»
Archive
»
2019
»
Issue 53: Secur...
»
container backends. 03 # It adheres to TOML format and does not support recursive 04 # lists of registries. 05 06 # The default location for this configuration file is /etc/containers/registries.conf. 07
08
« Previous
1
2
3
4
5
6
7
8
9
10
Next »