search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(591)
Article
(181)
News
(20)
Blog post
(2)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
Next »
17%
Desktops and applications with Essentials
16.08.2018
Home
»
Archive
»
2018
»
Issue 46: CMS S...
»
in packages of 25 users, and you cannot transfer or use existing Citrix licenses. XenApp Essentials and XenDesktop Essentials each cost $
12
per user per month. However, these are only the costs
17%
The best performance yet
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
in combination with a card supporting the extended standard (SDXC). CQ mode was introduced in 2017 with version 6.
0
of the SD specification [4], but although the Linux kernel had been supporting CQ mode for e
17%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home
»
Articles
»
://console.aws.amazon.com/cloudfront/home. Next, click on Create Distribution (Figure 2), and select Web | Continue . Under Origin Settings, enter the full address for your website (rather than my example site www.m
0
nk3y.biz ) and a descriptive
17%
Windows Subsystem for Linux and Android in Windows 11
28.11.2022
Home
»
Archive
»
2022
»
Issue 72: OpenS...
»
benefits graphically intensive applications, but also those that require GPUs for machine learning (ML) or artificial intelligence (AI) use cases. Microsoft has ported the DirectX
12
interface to Linux
17%
Searching for security flaws and exploits with Burp Suite
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
the Proxy Listeners Section (Figure 1) to identify the IP Address and port the proxy is listening on. The default port is 127.
0.0
.1:8080. Figure 1: Options
17%
Intruder Tools
13.12.2011
Home
»
Articles
»
packetstormsecurity.org packetstormsecurity.org,199.58.210.
12
,A NS25.WORLDNIC.COM,205.178.190.13,SOA ns25.worldnic.com,205.178.190.13,NS ns26.worldnic.com,206.188.198.13,NS mail.packetstormsecurity.org,199.58.210.
12
,MX
17%
Run rootless Podman containers as systemd services
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
=FreshRSS feed aggregator 03 04 [Container] 05 Image=docker.io/freshrss/freshrss:1.25.
0
06 ContainerName=freshrss 07 HostName=freshrss 08 Volume=%h/containers/freshrss/data:/var/www/FreshRSS/data:Z 09 Volume=%h
17%
Pen Test Tips
30.04.2012
Home
»
Articles
»
in the Metasploit Framework itself. Start the Metasploit msfconsole console and load nessus : msf > load nessus Once the plugins are loaded, connect to the server. msf > nessus_connect cr
0
wn:password@localhost ok
17%
Next-generation terminal UI tools
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
(Figure 3). It presents a history ribbon view of the CPU, breaks out individual cores, and includes load average [
12
] figures. Network interfaces benefit from a similar visualization (Figure 4
17%
Admin as a service with sysstat for ex-post monitoring
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
ALL 04 $ sar -f /var/log/sysstat/sa07 -s 23:30:00 -e 23:55:00 -P
1,2
However, filtering by specific days is often not enough, so you can filter for a time interval by passing -s [
« Previous
1
...
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
Next »