search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(1062)
Article
(333)
News
(120)
Blog post
(5)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
70
71
72
73
74
75
76
77
78
79
80
81
82
83
...
152
Next »
16%
VirtualBox Zero-Day Vulnerability Published
20.11.2018
Home
»
News
»
with root or administrator rights in the guest OS to escape and execute arbitrary code in the application layer (ring
3
) of the host OS, which is used for running code from most user programs with the least
16%
Stack Overflow Survey: 66% of Developers Frustrated by AI Inaccuracy
07.08.2025
Home
»
News
»
Positive sentiment for AI has decreased among developers from more than 70% last year to 60% this year, says the 2025 Developer Survey from Stack Overflow. This year’
s
survey asked several
16%
Forensic main memory analysis with Volatility
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
, the Virtual Machine Manager can create a snapshot, which appropriate tools then take apart [2] [
3
]. A bare metal Linux presents forensic experts with greater challenges: Every change to the system also changes
16%
Passwords, passphrases, and passkeys
26.03.2025
Home
»
Archive
»
2025
»
Issue 86: Data...
»
password, and the need to remember it. Unrealistic Rulesets Bill Burr wrote the official password guide for the U.
S
. National Institute of Standards and Technology (NIST). According to the guide
16%
pdsh Parallel Shell
08.07.2018
Home
»
HPC
»
Articles
»
using GNU’
s
autoconfigure before: ./configure --with-ssh --without-rsh make make install These three lines put the binaries into /usr/local/ , which is fine for testing purposes. For production work, I
16%
Throw Down the Gauntlet
14.08.2018
Home
»
Archive
»
2018
»
Issue 47: Findi...
»
the output. Moving on to Listing
3
, you can see which “trusts” are checked. Those with eagle eyes will spot that my website uses Let’
s
Encrypt certificates. Listing
3
: Another Section of SSLyze Output Trust
16%
Have a Bash with the Zing network utility
25.09.2023
Home
»
Archive
»
2023
»
Issue 77: Secur...
»
: 55 ms. Port: 80: op 2.1. 10.0.0.23 80 Time: 26 ms. Port: 80: op
2.2
. 10.0.0.23 80 Time: 56 ms. Port: 80: op
3
.1. 10.0.0.23 80 Time: 25 ms. Port: 80: op
3
.2. 10.0.0.23 80 Time: 48 ms. Port: 80: op 4
16%
The Road to End-of-Scale
19.06.2013
Home
»
HPC
»
Articles
»
within 2µs of each other, you would be limited to 8,500m
3
. With Titan a starting point, and assuming Pollack’
s
Rule (doubling the performance two times), you should be able to achieve 100TFLOPS/m
3
16%
Tools for managing AWS cloud services
20.06.2022
Home
»
Archive
»
2022
»
Issue 69: Terra...
»
you specified. Managing
S
3
with the Python SDK APIs let you completely manage AWS services. The cloud provider offers SDKs to reduce programming complexity. A wide range of programming languages
16%
Modularize websites with Web Components
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
to the right of the dummy text. Figure
3
shows the associated source code for the new item in the browser's developer console. Figure 2: The
Web
« Previous
1
...
70
71
72
73
74
75
76
77
78
79
80
81
82
83
...
152
Next »