search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(90)
Article
(41)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Next »
15%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
DestinationSizeChange 41943106 (40.
0
MB
) Another view of the file statistics lists which file effected the change: # gunzip -c /mnt/backup/rdiff-backup-data/file_statistics.\ 2015-03-15T10\:44\:06+01\:
00
.data.gz | awk '$2
15%
Policy rulesets in cloud-native environments
06.10.2022
Home
»
Archive
»
2022
»
Issue 71: Kuber...
»
{ 10 "UserName": "ferdinand", 11 "SerialNumber": "arn:aws:iam::123456789:mfa/ferdinand", 12 "EnableDate": "2021-04-25 09:
00:38+00:00
"
13
} 14 ], 15 "Groups
15%
Tuning I/O Patterns in Python
18.12.2013
Home
»
HPC
»
Articles
»
__ == "__main__": 12
13
local_dict = {'x':
0
, 'y':
0
, 'z':
0
,'value':
0.0
}; 14 my_record = []; # define list 15 16 counter_limit = 2000; 17 18 f = open('test.bin', 'r+') 19 for counter in range(1,counter
15%
Parallel Programming with OpenCL
04.11.2011
Home
»
HPC
»
Articles
»
{ 38 float convolutionSum =
0.0
f; 39 40 // Iterate over convolution kernel 41 for(size_t ky =
0
; ky < kernel.height; ++ky) 42 { 43 for(size_t kx =
0
; kx
15%
Cross-Vendor IPsec
25.10.2011
Home
»
Articles
»
-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.
0
/24; 20 remote 192.168.2.
0
/24; 21 service any;
22
} 23
15%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
aes256-sha1;
13
} 14 vpn racoonvpn { 15 bind-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.
0
/24; 20 remote
15%
Build a honeypot with real-world alerts
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
. The takeaway is the -j LOG option (line 12), which logs port scanning behavior to a logfile with the iptables: prefix. Listing 1 iptable Rules 01 *filter 02 *filter 03 :INPUT ACCEPT [
0:0
] 04
15%
Detecting malware with Yara
09.10.2017
Home
»
Archive
»
2017
»
Issue 41: Kuber...
»
= "A pdf file that contains a bad link" 10 11 strings: 12 $pdf_magic = {68 47 77
22
}
13
$s_anchor_tag = "
0 and (#s
15%
Protect Your Servers with Nmap
23.07.2012
Home
»
Articles
»
for brevity] 8 10.59 so-4-2-
0
.mpr3.pao1.us.above.net (64.125.28.142) 9 11.
00
metro
0
.sv.svcolo.com (208.185.168.173) 10 9.93 scanme.nmap.org (64.
13
.134.52) Nmap
15%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.nmap.org (64.
13
.134.52): Not shown: 994 filtered ports PORT STATE SERVICE VERSION
22
/tcp open ssh OpenSSH 4.3 (protocol 2.
0
) 25/tcp closed smtp
« Previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Next »