search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3&00 Llorente 22
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(65)
Article
(30)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
3
4
5
6
7
8
9
10
15%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
proxy_intercept_errors on; 17 ... 18 Filming location 19 ...
20
error_page 502 @ fallback; 21 proxy_next_upstream HTTP_500 http_502 http_503 http_504 timeout error invalid_header;
22
proxy_pass http
15%
Wireshark
27.11.2011
Home
»
Articles
»
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device
14%
Moving HPC to the cloud
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
will provide sub-par performance. A deeper treatment of these issues can be found in a recent article called "Will HPC Work in the Cloud?" [
3
]. Finally, any remote computation scheme needs to address
14%
Moving HPC to the Cloud
19.10.2012
Home
»
HPC
»
Articles
»
is US$
3
.1/hour. Thus, using the small usage case (80 cores, 4GB of RAM per core, and basic storage of 500GB) would cost US$ 24.
00
/hour (10 Eight Extra Large Instances). The larger usage case (256 cores
14%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
14%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
« Previous
1
...
3
4
5
6
7
8
9
10