search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente"22
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(52)
Keywords
« Previous
1
2
3
4
5
6
Next »
78%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24;
20
remote
76%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:
00
:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
75%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/"
20
21 echo $newid >> vm-list.txt
22
23 echo "cloning finished, starting vm" 24 virsh start $vmname
75%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda
20
Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
74%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.
x
are noticeable in Tomoyo versions
2.2
.
x
and 2.
3
.
x
; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel
3
.2, which
74%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0
20
:07 ?
00:00:00
[o2net] root 3965 7 0
20
:24 ?
00:00:00
[ocfs2_wq] root 7921 7 0
22
:40 ?
00:00:00
[o2hb-BD5A574EC8] root 7935 7
73%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h
00:22
:6E:71:04:BB -m
00
:0C:29:B2
72%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
SUSE users should use the openSUSE Build Service to install [UCC:
x
20
-kl-listing-bold]rabbit-mq[/UCC] http://
3
. Doing so means that YaST automatically adds repositories that you need later on. Once you have
72%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
71%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib/vmware/bin/vmware-hostd |awk '{print $
3
}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\n' -qf |sort -u
20
glibc 21 libgcc
22
libstdc++ 23 libxml2 24 nss-softokn-freebl 25 zlib 26 ...
3
... VMware Server
2.0
on recent Linux distributions
« Previous
1
2
3
4
5
6
Next »