search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(90)
Article
(24)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »
28%
Resource Management with Slurm
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
In previous articles, I examined some fundamental tools for HPC systems, including pdsh [1] (parallel shells), Lmod environment modules [2], and shared storage with NFS and SSHFS [
3
]. One remaining
28%
Machine learning and security
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
interacts with the environment as an agent, much like a sentient being (Figure
3
). The agent has to explore the environment and typically only learns after a certain number of actions whether
28%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
] about how the Dalai Lama and many a government had exploits foisted on them in PDFs [
3
]. Metasploit is everywhere. Charly Kühnast also covered the topic in his Linux Magazine sys admin column [4
28%
VAX emulation with OpenVMS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
downloaded the approximately
3
MB
ZIP file, create a folder before you unpack, because the archive does not contain one. If you simply unzip, all the files and directories end up in the current directory
28%
Automation Scripting with PHP
16.10.2012
Home
»
Articles
»
bytes:215392635 (215.
3
MB
) TX bytes:1759757 (1.7
MB
) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK
28%
Win-Win with Cygwin
23.01.2012
Home
»
Articles
»
fingerprint is 87:17:c
3
:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:
09
. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
28%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
struct jail 01 main(int argc, char **argv) 02 { 03 struct jail j; 04 int i; 05 [...] 06 /* Populate the jail struct */ 07 memset(&j, 0, sizeof(j)); 08 j.version = 0;
09
j.path =
28%
Exploring the Xeon Phi
05.11.2013
Home
»
Articles
»
processor managed only
0.9
GFLOPS per watt with a total capacity of 85GFLOPS. Unfortunately, the Polaris was extremely difficult to program and was never available as a commercial product – only five people
28%
Open source customer relationship management software
05.02.2019
Home
»
Archive
»
2019
»
Issue 49: Anato...
»
With the supporting dependencies installed, you are now ready to download the latest stable SuiteCRM package [
3
]. At the time of writing, the latest release was version 7.10.11, which is the version I work
28%
Prepare, analyze, and visualize data with R
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
(dayOfYear):as.factor(wday)Monday 16.64 18 8.382 < 2e-16 *** s(dayOfYear):as.factor(wday)Saturday 11.29 18
3
.307
3
.00e-
09
*** s(dayOfYear):as.factor(wday)Sunday 12.92 18 4.843 1.02e-13 *** --- Signif. codes: 0
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
Next »