19%
14.03.2018
, six MariaDB servers [2] are used in Galera Cluster [3], and hosting is handled by nine Apache servers (four each for sync and web and one for management). Switch uses Redis [4] as its key-value store
19%
09.06.2018
(handshake, alert, CCS, or application data) (Figure 3). After symmetric keys are programmed, inline TLS functionality is enabled; henceforth, the TLS layer bypasses all crypto operations, and plain text
19%
05.08.2024
so, for a combination of open source software with extension modules and commercial support.
Starting Point
The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review
19%
30.01.2024
vulnerabilities. If you don't want to fire OpenVAS at your servers, you can use the leaner Lynis [3]. The tool runs more than 200 tests and after a few minutes presents its report in the terminal or by email
19%
03.04.2024
on the GitHub platform [2] under the GNU Affero General Public License version 3 (AGPLv3). In this article, I look at the free version's basic feature set.
Relay Servers
Depending on the operating system
19%
16.05.2013
In PowerShell 3.0, Microsoft lets admins manage, install, or adapt virtually any service on a Windows server via the shell. In this article, I introduce some of the new and interesting commandlets
19%
13.02.2017
.g., www.example.com
). To that end, a corresponding A record (or AAAA [quad-A] record for IPv6) must be stored for a domain, and a corresponding PTR record (which refers to the A record) must be created
19%
12.09.2013
Compute Engine, Rackspace, Microsoft Azure). The service is now available in the US as part of the Early Access Program, with a plan for it to go on general sale in 2013Q3; the rumored release date
19%
03.09.2013
and data, PCoIP can allow or prohibit looped USB devices explicitly.
Workstation with Host Card
With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
19%
17.09.2013
-keygen -t rsa
(optionally, ssh-keygen -t dsa
) to generate a new RSA or DSA key pair of public and private keys (Figure 3).
Figure 3: Generating a RSA key