search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00 Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(52)
Keywords
« Previous
1
2
3
4
5
6
Next »
78%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24;
20
remote
76%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14
22
: 22998855 0 IO-APIC-fasteoi psb@pci:0000:
00
:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
75%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
-net.rules -e "s/$oldmac/$newmac/" 19 virt-edit $vmname /etc/sysconfig/network -e "s/vm1/$vmname/"
20
21 echo $newid >> vm-list.txt
22
23 echo "cloning finished, starting vm" 24 virsh start $vmname
75%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda
20
Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
74%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.
x
are noticeable in Tomoyo versions
2.2
.
x
and 2.
3
.
x
; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel
3
.2, which
74%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0
20
:07 ?
00:00:00
[o2net] root 3965 7 0
20
:24 ?
00:00:00
[ocfs2_wq] root 7921 7 0
22
:40 ?
00:00:00
[o2hb-BD5A574EC8] root 7935 7
73%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h
00:22
:6E:71:04:BB -m
00
:0C:29:B2
72%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
SUSE users should use the openSUSE Build Service to install [UCC:
x
20
-kl-listing-bold]rabbit-mq[/UCC] http://
3
. Doing so means that YaST automatically adds repositories that you need later on. Once you have
72%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
71%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib/vmware/bin/vmware-hostd |awk '{print $
3
}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\n' -qf |sort -u
20
glibc 21 libgcc
22
libstdc++ 23 libxml2 24 nss-softokn-freebl 25 zlib 26 ...
3
... VMware Server
2.0
on recent Linux distributions
« Previous
1
2
3
4
5
6
Next »