search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb%3%A9n Llorente"52
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(74)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
53%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
52%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
52%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
52%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c
3
:92:44:ba: 1
a
:df:d7:
9
c:44:b2:5b:73:
52
:09. Are you sure you want to continue
52%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
51%
Dynamic routing in Linux with Quagga
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
password 8 ZDF339
a
.20
a
3
E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 ! 12 interface eth1 13 ip address 10
51%
Getting started with I/O profiling
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
2 2
3
512KB < < 1
MB
3
2 2
3
2 4
3
4 1
MB
< < 10
MB
87 87 87 84 74 67
50%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
_seq=
3
ttl=
52
time=103 ms Personally, I prefer using tunnels over Teredo and 6to4 for several reasons – the simplest is that it works with a public IP or behind a NAT box (well, usually). Tunnels ...
3
49%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
lacks support for SSH access and access to the hard disks' S.M.
A
.R.T data. Thecus
N
6850 We imported the Thecus
N
6850 from its vendor in the Far East, but you can buy it directly from dealers. What you
49%
Creating and evaluating kernel crash dumps
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
kernel sles:~ # grep crash /proc/cmdline root=/dev/disk/by-uuid/10
a
83ffe-5
a
9
f-48
a
2-b8cb-551c2cc6b42d resume=/dev/sda
3
splash=silent text showopts crashkernel=128 sles:~ # /etc/init.d/boot.kdump status
« Previous
1
2
3
4
5
6
7
8
Next »