search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1266)
Article
(320)
News
(209)
Blog post
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
180
Next »
10%
Creating RAID systems with Raider
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
If you are looking for more performance or more security, RAID storage is always a useful solution. Whereas the non-redundant RAID
0
speeds up data access, RAID 1 duplicates your data and therefore
10%
RSQL, a Microsoft SQL clone
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
requirements for using RSQL are a 64-bit system with only 100
MB
of RAM; 100
MB
of disk space is sufficient. Basic knowledge of SQL and its syntax are useful for operations. Installation instructions are available
10%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
-43c
0
-... | | da000609-a85f-4d46-8abd-ff649c4cb173 | ext_net |
0
f5c7b17-65c10-... | +--------------------------------------+-----------+------------------ root@alice:~# quantum floatingip-create da
10%
A Btrfs field test and workshop
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
0
, 1, and 10 RAID level conversion on the fly Background process for detecting and correcting errors proactively ("scrubbing") Growing and shrinking a filesystem on the fly Defragmentation
10%
Comparing system rescue distros
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
an executable Grml installation to a standard USB storage device in next to no time. If you want to do yourself a favor, grab a USB storage device with USB 3.
0
, which has long been standard. As icing on the cake
10%
News for Admins
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100
MB
had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500
MB
... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.
0
; NSA Issues Zero Trust Guidelines for Network Security
10%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
} 13 $s_anchor_tag = "
0 and (#s
10%
Convert Linux shell commands into PowerShell cmdlets
07.04.2022
Home
»
Archive
»
2022
»
Issue 68: Autom...
»
Shell version. This two-pronged approach is also reflected in the system requirements: To create a package based on Crescendo, you need PowerShell version 7.
0
, whereas the modules will run in Windows PowerShell 5
10%
A self-healing VM system
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
# DHCP Server Configuration file. # see /usr/share/doc/dhcp*/dhcpd.conf.example # see dhcpd.conf(5) man page # subnet 10.14.2.
0
netmask 255.255.255.
0
{ option routers 10
10%
What's left of TLS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.
0
(SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered
« Previous
1
...
59
60
61
62
63
64
65
66
67
68
69
70
71
72
...
180
Next »