search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3!600 Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(94)
Keywords
« Previous
1
2
3
4
5
6
7
8
...
10
Next »
44%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
traffic normally unavailable because of layer 2 switching. Arpspoof [
3
] is much simpler than ettercap for redirecting packets: # arpspoof -i eth0 -t
host Specifying the interface is optional
43%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
and then rewrites the Contact header to contain the publicly reachable NAT gateway socket. Listing
3
shows an Invite request that has been modified by the SIP proxy: 18.17.16.15 is the gateway's public address; 20.
22
43%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
compared with version 1.x are noticeable in Tomoyo versions
2.2
.x and 2.
3
.x; the current version 2.5 only lacks a couple of features. Unfortunately, version 2.5 is only available in Linux kernel
3
.2, which
43%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
gas prices. The company announced its VMware Ready Desktop Solutions program on June
22
. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
43%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer"; 13 $node2 = "AppServer"; 14 $node
3
= "DBMServer"; 15 $think = 0.0 * 1e-
3
; # as per test system 16 $dtime =
2.2
* 1e-
3
; # dummy service time 17 18
43%
Netcat – The admin's best friend
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
seconds, for example: # nc -p 16000 -w 30 examplehost.tld
22
If firewalling is in place and you need to originate your connection from a specific IP address to open a port, then you can enter: # nc -s 1.2.
3
43%
Using Expect scripts to automate tasks
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
conservatively originally 21 if {$force_conservative} {
22
set send_slow {1 .1} 23 proc send {ignore arg} { 24 sleep .1 25 exp_send -s -- $arg 26 } 27 } 28
43%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [
3
] keeps a close eye on your
43%
Server virtualization with VirtualBox
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
apache2-mpm-prefork apache2-utils apache
2.2
-bin apache
2.2
-commona pache2-doc apache2-suexec libapache2-mod-php5 libapr1 libaprutil1 libaprutil1-dbd-sqlite
3
libaprutil1-ldap libapr1 libaprutil1 libaprutil1
43%
Live migration of virtual machines on Hyper-V
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure
3
). Figure
3
: Scheduling the replication
« Previous
1
2
3
4
5
6
7
8
...
10
Next »