search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(594)
Article
(182)
News
(20)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
63
64
65
66
67
68
69
70
71
72
73
74
75
76
...
80
Next »
17%
Halting the ransomware blackmail wave
05.12.2016
Home
»
Archive
»
2016
»
Issue 36: Autom...
»
to recover the encrypted files. Once the encryption process is complete, Locky stores a ransom demand and also sets up a desktop background with a ransom demand. It requires the victim to pay a ransom of
0
17%
The simpler alternative to cron: Whenjobs
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
, you will need the matching compiler and a few packages. You can install these with the following command, for example, on Ubuntu
12
.10: sudo apt-get install ocaml ocaml-findlib libcalendar
17%
File Integrity Checks with AIDE
04.12.2024
Home
»
Archive
»
2024
»
Issue 84: Non-R...
»
consumed virtually no resources on a CPU with
12
cores. The file /var/lib/aide/aide.db.new was created and had to be renamed aide.db for use in checks. The output will contain the checksums of the various
17%
Supercharge your Website with Amazon CloudFront
11.06.2014
Home
»
Archive
»
2014
»
Issue 21: Manag...
»
for your website (rather than my example site www.m
0
nk3y.biz ) and a descriptive Origin ID (Figure 3). Leave all the other options at the defaults and scroll down to Distribution Setting, where you add your
17%
Apache Storm
08.10.2015
Home
»
Archive
»
2015
»
Issue 29: Rescu...
»
wget
sudo unzip -o apache-storm-
0
.9.2-incubating.zip -d /usr/share/ sudo ln -s /usr/share/apache-storm-
0
.9.2-incubating /usr/share/storm sudo ln -s /usr/share/storm/bin/storm /usr
17%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
$keyfile /etc/ssh 08 chmod 644 /etc/ssh/$filename 09 done 10 if [ -f .ssh/config ]; then 11 cat .ssh/config >> /etc/ssh/ssh_config
12
sed -i 's|~/.ssh|/etc/ssh|g' /etc/ssh/ssh_config 13
17%
How Old is That Data?
20.04.2017
Home
»
HPC
»
Articles
»
. For example, [laytonjb@home4 ~]$ agedu -w Using Linux /proc/net magic authentication URL: http://127.
0.0
.1:42821/ A screenshot of the web browser output is shown in Figure 1
17%
PowerShell scripts for managing Microsoft 365 components
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
Types "Unified" -MailEnabled $true -SecurityEnabled $true -LabelId f460a5b
0
-8d8e-4ac1-bb92-afb9ea
22
f9da If you followed the steps and created the LabelActions as shown in the example, the labeled team
17%
CoffeeScript: A Replacement for JavaScript?
05.03.2013
Home
»
Articles
»
color: "Red", 11 Model year: 1988
12
} 13 }; Programmers can use variables directly; the appropriate var s are added by CoffeeScript when you compile. As in shell scripts, the hash sign (# ) starts
17%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home
»
CloudAge
»
Articles
»
Definition), against which all requests get validated as soon as they are received by one of the processing servers. Listing 2 Request XML 0" encoding="UTF-8"?>
« Previous
1
...
63
64
65
66
67
68
69
70
71
72
73
74
75
76
...
80
Next »