search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(91)
Article
(26)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »
28%
Resource Management with Slurm
05.11.2018
Home
»
HPC
»
Articles
»
nodes, and make sure to do this as a user and not as root.
3
. To make life easier, use shared storage between the controller and the compute nodes. 4. Make sure the UIDs and GIDs are consistent
28%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [
3
]. One remaining
28%
Machine learning and security
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
interacts with the environment as an agent, much like a sentient being (Figure
3
). The agent has to explore the environment and typically only learns after a certain number of actions whether
28%
Automate your VMware configuration with Puppet
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only
3
GB of RAM and two processor cores are required, the installation
28%
Profiling Python Code
09.12.2019
Home
»
HPC
»
Articles
»
hints, is written in C as a Python extension and comes in the standard Python
3
, which keeps the overhead low, so the profiler doesn’t affect the amount of time much. cProfile outputs a few stats about
28%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [
3
]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
28%
Moving HPC to the cloud
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
will provide sub-par performance. A deeper treatment of these issues can be found in a recent article called "Will HPC Work in the Cloud?" [
3
]. Finally, any remote computation scheme needs to address
28%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
struct jail 01 main(int argc, char **argv) 02 { 03 struct jail j; 04 int i; 05 [...] 06 /* Populate the jail struct */ 07 memset(&j, 0, sizeof(j));
08
j.version = 0; 09 j.path =
28%
Detecting security threats with Apache Spot
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
risks, quantifying possible data loss and responding to attacks. Apache Spot [
3
] uses big data and modern ML components to improve the detection and analysis of security problems. Apache Spot 1.0 has been
28%
Open source customer relationship management software
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
With the supporting dependencies installed, you are now ready to download the latest stable SuiteCRM package [
3
]. At the time of writing, the latest release was version 7.10.11, which is the version I work
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »