How can I determine if someone has compromised the system for cluster use purposes and what do you recommend I do to prevent your software from turning my Web server into someone else's cluster node?
There are many different implementation of Beowulf software out there, and you may be seeing one of them. But it's more likely that you are seeing the kernel message from one of the device drivers I wrote when I was working on the Beowulf Project at NASA. Usage information for some of those drivers was published on the Beowulf.org website, and the drivers had URLs with "beowulf.org".
This was first published in August 2006