search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%2n2222a Llorente 22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(23)
Keywords
« Previous
1
2
3
Next »
91%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
20
-kl-listing-bold]zlib[/UCC] and [UCC:
x
20
-kl-listing-bold]libxml[/UCC] . Debian and Ubuntu call them [UCC:
x
20
-kl-listing-bold]zlib1g-dev[/UCC] and [UCC:
x
20
-kl-listing-bold]libxml
2
-dev[/UCC] ; open
91%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
m Memory
n
Networks s Sockets t TCP
x
Interconnect y Slabs Table
2
lists the aspects that can be measured
91%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
/inet/IPsecinit.conf: Contains the policy, like the setkey script on Kame/Racoon; however, the file also contains the algorithms for Phase
2
. A tunnel interface is also typically configured. /etc/hostname.ip.tun
X
: Typically
90%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/
2
)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
90%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
}
20
\usepackage{ngerman} 21 \usepackage[official,right]{eurosym}
22
\\\begin{document}" > att1.tex 23 echo "\end{document}" > att3.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
90%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
=TR/CN=John_Doe/emailAddress=jd@example.com 07 Serial: 03 08 Serialized id: SafeNet\
x
20
Inc\
x
2
E/eToken/xxxxxxxx/eToken/xxxxxxxxxxxxxxxxxx OpenVPN Management Interface Because Linux systems don't have a crypto store, you need
90%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
qemu_
x
86_defconfigmake menuconfig (build-option, Kernel-Version 3.
2
, gdb, tty1)makemake linux-menuconfig (debug info) make 3. Compile the module and copy it to the root directory:cd driverexport CROSS
89%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
initial tests are quite reasonable: 1GB memory, a virtual CPU, about
20
GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun
x
VM VirtualBox is a good choice
89%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
idea to choose an intuitive name. Listing
2
shows an example. Listing
2
Your Own Domain in OpenShift 01 # rhc-create-domain -
n
tuxgeek -l tscherf@gmail.com 02 Password: 03 Generating
88%
A standard cloud computing API
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
"Polling for changes (Ctrl-C to end)" 17 loop do 18 sleep
2
19 client.instances.each do |inst|
20
if state[inst.id] != inst.state 21 if state[inst.id]
22
puts "#{inst.id} changed from
« Previous
1
2
3
Next »