search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(503)
Article
(163)
News
(41)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
47
48
49
50
51
52
53
54
55
56
57
58
59
60
...
71
Next »
15%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
functions to run several separate virtualized OpenShift clusters on a single physical cluster. In this way, several clusters can be operated with separate
root
access, yet still share underlying resources
15%
A flexible, customizable, personal dashboard
30.01.2024
Home
»
Archive
»
2024
»
Issue 79: Monit...
»
Dashy running, you will want to customize the environment by editing the YAML-based /public/conf.yml configuration file. The file has three
root
attributes: pageInfo is where you store the dashboard
15%
Blocking SQL injections with GreenSQL
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
query that triggered it. Thanks to extensive logging capabilities, you can quickly find the
root
cause of any problem. In the case of the Koha library system, GreenSQL had difficulties with the set
15%
Network management with the IPRoute2 toolbox
12.09.2013
Home
»
Archive
»
2013
»
Issue 16: Docker
»
in many scenarios behind the scenes, its use at the command line has not quite taken
root
in the minds of many administrators. However, the learning curve is not as long and arduous as many admins might
15%
SHA-3 – The new hash standard
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
, a team of researchers presented an attack against MD5 signatures at 25C3, the Chaos Computer Club's annual congress [5]. This attack allowed them to create a spoofed
root
certificate on an SSL certificate
15%
Creating a non-certified Windows To Go USB drive
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
Windows boot files to the
root
of the bootable USB drive: C:> BCDBOOT.EXE E:\WINDOWS /S E: /F ALL Boot files successfully created. This command transfers the boot or system files to the USB Drive for any
15%
Client management in the domain using PowerShell
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
search parameters. The search direction can be upwards ascending to the
root
of the domain. The choice of the search area, the complexity of the search pattern, and the search method affect the time
15%
Workspace ONE for endpoint management
03.02.2022
Home
»
Archive
»
2022
»
Issue 67: syst...
»
rooted
devices or devices with jailbreak. These rules can also be used to allow or prohibit applications. Adaptive Management With adaptive management, users do not log their devices into Workspace ONE
15%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
a full backup of the server before attempting the migration. All the following operations should run as
root
. Connect to your server and fire up a session manager such as tmux or screen . You can install
15%
Integrate remote cloud storage
27.09.2024
Home
»
Archive
»
2024
»
Issue 83: Storage
»
of the
root
directory, not file names: $ rclone sync -P /
/
:/
/ Rclone copies the data to the cloud and keeps the folder structure. The -P parameter displays a progress bar. Rclone
« Previous
1
...
47
48
49
50
51
52
53
54
55
56
57
58
59
60
...
71
Next »