search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(69)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
24%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\n
"; 13 echo "Hash: " . $hashvalue . "\n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$9IQRaTwmfeRo7ud9Fh4E2PdI
0
S
3r.L
0
'; 17 // stored hash, would
24%
Web applications with Julia
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
startserver() 05 WebSockets.listen("127.
0.0
.1", PORT) do ws 06 for msg in ws 07 d = Meta.parse(JSON.parse(msg)["
s
"]) 08 WebSockets.send(ws, """
You picked $d
24%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
's usually TCP port
22
) to port 2222, for example, to keep port scans from filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations
24%
Kick-start your AI projects with Kubeflow
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
've not even mentioned Kubernetes itself (see the "Taming the AI Infrastructure" box). Any administrator who has ever rolled out K8
s
knows that success is by no means guaranteed. Taming the AI
24%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
.DevCenter/devcenters/attachednetworks@2024-02-01' = { 18 name: networkConnection.name 19 parent: devcenter 20 ... } 21
22
resource devcenterGalleryImage 'Microsoft.DevCenter/devcenters/galleries/images@2024-02-01' existing = { 23
24%
Supercomputing Conference 2024
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
's Perlmutter Supercomputer. IEEE, 2024: DOI 10.1109/SCW63240.2024.00180: https://conferences.computer.org/sc-wpub/pdfs/SC-W2024-6oZmigAQfgJ1GhPL
0
yE3p
S
/555400b391/555400b391.pdf Open OnDemand: https
24%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
tcsh\r" 06 expect "#" 07 send "cp .ssh/authorized_keys ~root/.ssh\r" 08 expect "#" 09 send "cd /etc/ssh; cp sshd_config{,.
0
}\r" 10 expect "#" 11 send "cat sshd_config.
0
| sed -e '
s
24%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
server also requires Sun Java SDK version 1.6.
0
. Some distributions keep this package in an external or special repository. On Debian, you need to enable the non-free package source; on Ubuntu 10.04, you
24%
Introduction to behavior-driven monitoring
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page
22
23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25
0
24%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
« Previous
1
2
3
4
5
6
7