search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm 12%25390 Llorente"523
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(14)
Keywords
« Previous
1
2
86%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
86%
Dynamic routing in Linux with Quagga
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
password 8 ZDF339
a
.20
a
3E 05 log file /var/log/quagga/zebra.log 06 service password-encryption 07 ! 08 interface eth0 09 multicast 10 ipv6 nd suppress-ra 11 !
12
interface eth1 13 ip address 10 ...
12
85%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_world[]="Hello World\
n
"; 08 static dev_t hello_dev_number; 09 static struct cdev *driver_object; 10 static struct class *hello_class; 11 static struct device *hello_dev;
12
13 static ssize_t driver_read( struct file
84%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
total = summary.values.inject(0) { |sum, i| sum += i }
12
puts "Found #{total} instances in the following states:" 13 summary.keys.sort.each do |s| 14 printf "%20s %d\
n
", s, summary[s] 15 end 16 puts
« Previous
1
2