search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(69)
Article
(33)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »
14%
CRI-O and Kubernetes Security
30.11.2020
Home
»
Archive
»
2020
»
Issue 60: Secur...
»
cri-o-${CRIO_VERSION} The following NEW packages will be installed cri-o-1.17 0 to upgrade, 1 to newly install, 0 to remove and 0 not to upgrade. Need to get 17.3
MB
of archives. After this operation
14%
Security first with the Hiawatha web server
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
toolkit for joomla UrlToolkit { ToolkitID = joomla Match base64_encode[^(]*\([^)]*\) DenyAccess Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess Match GLOBALS(=|\[|\%[0-
9
A
-Z]{0,2}) Deny
14%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -
N
1 -s 100 echo -
n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
14%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
use generic-service 21 host_name w2k
12
srv
22
service_description Memory Usage 23 check_command check_nt!MEMUSE!-w 80 -c 90 24 } 25 define service{ 26
14%
Guarding against social engineering attacks
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
will be
2.2
GB lighter. Figure 1: The download options with the SHA
256
checksum to make sure it matches the reported checksum on the site. Be sure
14%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than
12
years ago [2
14%
DNSSEC-aware DNS caching with Unbound
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
INPUT iptables -
A
INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -
A
INPUT -i eth0 -j DROP iptables -
A
INPUT -i eth1 -p tcp --dport
22
-j ACCEPT iptables -
A
INPUT -i eth1 -j DROP
14%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
): ssh-keygen -t ed25519 -
a
100 -f ubuntu-sre-id_ed25519 -q -
N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
14%
Understanding the Status of Your Filesystem
18.06.2014
Home
»
HPC
»
Articles
»
.59 64–128
12
,083 3.11 90.70 128–
256
8,623 2.
22
92.93
256
–512 13,437 3.46 96.39 512–1,024 5,456 1
14%
Resource Management with Slurm
05.11.2018
Home
»
HPC
»
Articles
»
One way to share HPC systems among several users is to use
a
software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ... . The first configuration file is slurm.conf (Listing 1). Listing 1: slurm.conf 01 # 02 # Example slurm.conf file. Please run configurator.html 03 # (in doc/html) to build
a
configuration file customized 04 ... One way to share HPC systems among several users is to use
a
software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »