search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(693)
Article
(160)
News
(135)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
60
61
62
63
64
65
66
67
68
69
70
71
72
73
...
99
Next »
15%
Setting up the lightweight Lighttpd web server
25.03.2021
Home
»
Archive
»
2021
»
Issue 62: Lean...
»
["remoteip"]
Remote
IP or
remote
network; only works with IPv4 $SERVER["socket"] Socket; only works with the == operator; additionally, the value must have the format
:
. Instead
15%
Managing network connections in container environments
30.05.2021
Home
»
Archive
»
2021
»
Issue 63: Autom...
»
Proxy: https://traefik.io/traefik Traefik Mesh: https://traefik.io/traefik-mesh Babcock, Nick. "Monitoring
remote
sites with Traefik and Prometheus": https://nickb.dev/blog/monitoring-
remote
-sites-with-traefik-and-prometheus
15%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home
»
Archive
»
2015
»
Issue 30: OpenD...
»
then takes on the tasks of sending a configurable list of topics to
remote
brokers and receiving lists from
remote
brokers to distribute to local clients. Without TLS support, the clients are only exposed
15%
WSL puts Linux on Windows desktops
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
take a detour via the
Remote
Desktop Protocol (RDP) on top of Linux's own X Window System (X11) and provide a script that you can download and execute in the Kali shell with the commands: wget https
15%
Monitor and optimize Fibre Channel SAN performance
30.01.2020
Home
»
Archive
»
2020
»
Issue 55: AWS L...
»
sent, the buffer credit is reduced by a value of one, and for each data packet confirmed by the other party, the value increases by one. The
remote
station sends a receive ready (R_RDY) message
15%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
.cfg in the configuration directory, the [ansible defaults] section then needs to be extended to include the
remote
_user = root entry. This ensures that Ansible actually uses the root account. DebOps uses the ansible
15%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
, the [ansible defaults] section then needs to be extended to include the
remote
_user = root entry. This ensures that Ansible actually uses the root account. All hosts in the Ansible inventory layout used by Deb
15%
Jenkins Configuration as Code
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
.groovy.d script as inline code to YAML. For the sake of readability, you can move this snippet to a separate file (e.g., GerritTriggerConfigurator.groovy) and run it locally (with a file predicate) or
remotely
(e
15%
A self-healing VM system
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
, without using the guest operating system. It must also be able to create a new instance with a local image or template file. A
remote
template file can also be used, although it introduces a single point
15%
Implementing custom security frameworks with Bro
11.10.2016
Home
»
Archive
»
2016
»
Issue 35: Persi...
»
of devices, services, and tools used today, it's easy for attackers to enter networks in many different ways. Ransomware, botnets, malware, and
remote
control tools are readily available. Social engineering
« Previous
1
...
60
61
62
63
64
65
66
67
68
69
70
71
72
73
...
99
Next »