search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(344)
Article
(65)
News
(43)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
46
Next »
59%
Efficient central management of Windows libraries
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
2012
59%
Port-based access protection with NAP and 802.1X
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
2012
59%
Penetration testing and shell tossing with Metasploit
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
2012
59%
Welcome
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
59%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
59%
grml – 32 and 64 bits
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
59%
Introduction to LVM
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
this writes an LVM label and some metadata to the PV. The PV is divided up into units of the same size (4
MB
by default) known as physical extents (PEs). A PE is the smallest allocatable data volume. Figure 1 ...
2012
59%
Using a tablet as a portable management console
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
59%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
59%
Intruder detection with tcpdump
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
2012
« Previous
1
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
...
46
Next »