search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%2222%A9n Llorente"523
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(84)
Article
(5)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
Next »
46%
Securing AI model deployments with SELinux
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
AI workloads on Red Hat Enterprise Linux (RHEL)
9
through experiments simulating real-world attack scenarios. Our objectives are to evaluate the Linux security module's ability to prevent unauthorized ... We assess the effectiveness of SELinux in protecting AI model deployments on RHEL
9
, demonstrating its ability to block unauthorized access, modification, and resource exploitation through mandatory
46%
A GUI for Warewulf 4
06.05.2025
Home
»
Articles
»
be used with
a
curl command and the requested URL for the
n
1 node information. Part of the output of the command can be seen in the dark window at the bottom. This live session lets you try different
45%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
countless IRC server variants. Almost all originate from the original code, which is still in use today on IRCNet [1] and comes closest to the original IRC RFC [
2
]. Additionally, you will find a plethora
45%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -
n
| md5sum -t 319f4d26e3c536b5dd871bb
2
c52e3178 - Next, add this hash value instead of the password
45%
New approaches for forensics in cloud environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [
2
] [3]. Despite this, the topic is still largely overlooked and a huge amount
45%
Demystified: The facts about green IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, and IZES Institut für ZukunftsEnergieSysteme (Institute for Future Energy Systems) GmbH [1] [
2
] investigated precisely this topic. The question the researchers set out to answer was: How economical
45%
Create a high availability VM with DRBD9 and Reactor
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
://launchpad.net/~linbit/+archive/ubuntu/linbit-drbd
9
-stack LVM: https://sourceware.org/lvm
2
Attribution-ShareAlike 3.0 Unported: https://creativecommons.org/licenses/by-sa/3.0/deed.en virter: https://github.com/LINBIT/virter Linstor: https ... DRBD
9
and DRBD Reactor create a Linux high-availability stack for virtual instances with replicated storage comparable to the classic Corosync and Pacemaker solution. ... DRBD
9
and DRBD Reactor ... Create a high availability VM with DRBD
9
and Reactor
45%
Logger in HPC System Administration
07.07.2025
Home
»
Articles
»
myscript "
A
second test" The entry in the system log would look like: $ sudo tail -
n
10 /var/log/syslog ... Jun 28 14:28:55 laytonjb-Nitro-AN515-55 myscript:
A
second test ... Notice that rather than
45%
Introduction to OpenMP programming
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
) ! Delta (x and y directions) ... 117 ! Solution Initialization 118 ! +++ !$OMP PARALLEL DO SHARED(m,
n
,u) 119 DO j=
2
,m-1 120 DO i=
2
,m-1 121 u(i,j)=0.0d0 122 ENDDO 123 ENDDO +++ !$OMP END
45%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
« Previous
1
2
3
4
5
6
7
8
9
Next »