search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(535)
Article
(136)
News
(7)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
53
54
55
56
57
58
59
60
61
62
63
64
65
66
...
68
Next »
11%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9
20
# user setup 21 user --name=example-user --password=
--iscrypted --gecos="example-user" 22 # Disk partitioning
11%
Software-defined storage with LizardFS
17.06.2017
Home
»
Archive
»
2017
»
Issue 39: Conta...
»
.g., serial-attached SCSI hard drives or SSDs) and export a part of their filesystem to the storage pool. In a minimal case, a chunk server runs on a virtual machine and shares a filesystem (e.g., a
20
GB ext4
11%
Manage logical volumes with GUI tools
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
more data security. You make your choice when creating an LVM volume group, but usually all the tools set up linear volumes without RAID functionality. Frequently used RAID levels (e.g., RAID 5,
6
11%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
. Figure 1: Controlling filesystem access of default strict running mode (source: snapcraft.io [
6
]). To dev or Not to dev Developer mode (devmode ) offers a much looser set of controls, in the sense
11%
Aggregating information with Huginn
18.02.2018
Home
»
Archive
»
2018
»
Issue 43: Real...
»
], but it should also work with an Apache server without any problems [
6
]. The developers only guarantee smooth operation on Debian 7 or 8 and Ubuntu 14.04 or 16.04. In principle, the installation also works
11%
Minifying container images with DockerSlim
04.08.2020
Home
»
Archive
»
2020
»
Issue 58: Graph...
»
-slim[build]: info=image id=sha256:231d40e811cd970168fb0c4770f2161aa30b9ba
6
fe8e68527504df69643aa145 size.bytes=126323486 size.human=126 MB docker-slim[build]: info=image.stack index=0 name='nginx:latest' id='sha256
11%
Group policies on Windows Server 2022
05.02.2023
Home
»
Archive
»
2023
»
Issue 73: Datab...
»
that have emerged over
20
years of group policy design and structure, with an emphasis on rules that should always be implemented, even if nothing has changed technically and the best practices have been
11%
Make Your IT Automation Systems Play Together Like a Symphony
15.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
:create 19 end
20
21 cookbook_file "#{node['main']['doc_root']}/index.html" do 22 source 'index.html' 23 owner 'www1-data' 24 group 'www1-data' 25 action :create 26 end 27 28 template "/etc/apache2/sites
11%
Program from one source to many apps with Flutter
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
title: Text('Hello World'), 15 ), 16 body: Center( 17 child: Text('Hello World'), 18 ), 19 ),
20
); 21 } 22 } The source code of an app in Flutter
11%
Designing a secure Active Directory
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
and understand how these have changed for both organizations and end users over the past
20
years. In the late 1990s, when Microsoft designed Active Directory, all office workstations were hardwired and often had
« Previous
1
...
53
54
55
56
57
58
59
60
61
62
63
64
65
66
...
68
Next »