search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(870)
Article
(89)
News
(8)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
79
80
81
82
83
84
85
86
87
88
89
90
91
92
...
98
Next »
35%
Clone and deploy desktop computers with FOG
05.12.2019
Home
»
Archive
»
2019
»
Issue 54: NVMe...
»
repository with: $ git clone https://github.
com
/ FOGProject/fogproject.git ~/fogproject Once it's downloaded, change into the directory and fire up the installation script: $ cd fogproject/bin$ sudo
35%
An overview of the Citadel BBS
02.06.2020
Home
»
Archive
»
2020
»
Issue 57: Artif...
»
. Citadel Rooms Citadel's main characteristic is that everything is a room, at least internally. Rooms are arranged by floors (Figure
6
). For example, on a floor called Animal Talk , you might have the rooms
35%
Discovering SQL injection vulnerabilities
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
through the addition of modules. SQLmap needs Python version 2.
6
or newer. The Takeover function also requires the Metasploit framework [3]. SQLmap supports any popular database system, such as My
35%
Modularize websites with Web Components
09.04.2019
Home
»
Archive
»
2019
»
Issue 50: Bpfilter
»
, this tag is
...
. Lines 4 and 5 include the appropriate script components. Listing 1
and
01 [...] 02 03 [...] 04
35%
Manage cluster state with Ceph dashboard
27.09.2021
Home
»
Archive
»
2021
»
Issue 65: 7 Em...
»
are provided by the Prometheus developers online [5]. Predefined alerts for Ceph clusters can also be found online [
6
]. The rest then just involves putting the puzzle together: In the Alertmanager configuration
35%
Virtual environments in Windows Server
09.08.2015
Home
»
Archive
»
2015
»
Issue 28: SSD RAID
»
has been stored (step 5). The servers delay actual access to the physical data areas of the storage system (step
6
), thus optimizing overall speed
35%
A self-healing VM system
07.06.2019
Home
»
Archive
»
2019
»
Issue 51: Self-...
»
the same exit status conditions. Line
6
declares another check program, sync_all_node_5, that runs an Ansible playbook called sync_files.yml with webbox5 as the target. This program is run every 15 cycles
35%
Analyzing tricky database problems
14.03.2018
Home
»
Archive
»
2018
»
Issue 44: Cloud...
»
. The infrastructure also includes three LDAP servers, six NFS servers (based on Ceph), and two HAProxy load balancers. Monitoring is done via Graphite [5], with an Elasticsearch [
6
], Logstash [7], and Kibana [8] (ELK
35%
Persistent volumes for Docker containers
09.06.2018
Home
»
Archive
»
2018
»
Issue 45: Autom...
»
ESXi
6
.0 or higher and Docker v1.12 or later. VMware recommends version 1.13, or 17.03 if you want to use the "managed plugin" – the variant from the Docker store. If this is the case, the plugin
35%
Attacks on HTTPS Connections
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
to the server according to the original protocol, everything looks completely normal on the server side. A tool that demonstrates such an attack was published in 2009 [
6
]. As a precaution, sensitive data should
« Previous
1
...
79
80
81
82
83
84
85
86
87
88
89
90
91
92
...
98
Next »