search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%3%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(29)
Keywords
« Previous
1
2
3
Next »
91%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
91%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.x are noticeable in Tomoyo versions
2.2
.x and 2.
3
.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel
3
.2, which ...
9
91%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.1_release_notes oVirt Installation Guide: http://www.ovirt.org/w/images/
a/a
9
/OVirt-
3
.0-Installation_Guide-en-US.pdf ... Version
3
.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt
3
.1 ... Managing virtual infrastructures with oVirt
3
.1
91%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
90%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S
3
r.L0'; 17 // stored hash, would
89%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
.894212] vmware-hostd[3870]: segfault at 2100001c4f ip 0000003c0cb32ad0 sp 00007f3889e
9
cb88 error 4 in libc-2.12.90.so[
3
c0ca00000+19
a
000] Analysis and Plan A Initial analysis proved that the VMware ...
3
89%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_ERR_GENERIC;; 37
3
) return $OCF_NOT_RUNNING;; 38 esac 39 fi 40 41 ocf_log debug "Asterisk PBX monitor succeeded" 42 return $OCF_SUCCESS 43 } Listing
9
asterisk
89%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
88%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
88%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm
9
TRn
9
YIz
A
47T
3
JHPK4xVOzYu/8nc
3
wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk
9
DU
3
zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
« Previous
1
2
3
Next »