search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%3%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(31)
Keywords
« Previous
1
2
3
4
Next »
91%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
91%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.x are noticeable in Tomoyo versions
2.2
.x and 2.
3
.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel
3
.2, which ...
9
91%
Managing virtual infrastructures with oVirt 3.1
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
.1_release_notes oVirt Installation Guide: http://www.ovirt.org/w/images/
a/a
9
/OVirt-
3
.0-Installation_Guide-en-US.pdf ... Version
3
.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt
3
.1 ... Managing virtual infrastructures with oVirt
3
.1
91%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:00:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
91%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
ScanOptions 21 {
22
Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.
A
4, 25 Dpi = 300 26 }; 27 28 var images = new List
90%
Managing FOSS applications on AIX
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
:svrmtype:priority:signorm:sigforce:display:waittime:grpname:mariadb::-c "ulimit -
n
unlimited; ulimit -c 10; ulimit -m unlimited; ulimit -d unlimited; /opt/freeware/libexec/mysqld" :/usr/bin/sh:27:0:/dev/console:/dev/console:/dev/console:-O:-Q:-S:0:0:20:15:
9
:-d:20:: Now
90%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S
3
r.L0'; 17 // stored hash, would
89%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
.894212] vmware-hostd[3870]: segfault at 2100001c4f ip 0000003c0cb32ad0 sp 00007f3889e
9
cb88 error 4 in libc-2.12.90.so[
3
c0ca00000+19
a
000] Analysis and Plan A Initial analysis proved that the VMware ...
3
89%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_ERR_GENERIC;; 37
3
) return $OCF_NOT_RUNNING;; 38 esac 39 fi 40 41 ocf_log debug "Asterisk PBX monitor succeeded" 42 return $OCF_SUCCESS 43 } Listing
9
asterisk
88%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
« Previous
1
2
3
4
Next »