search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xsede Llorente"52
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(105)
Article
(2)
Keywords
« Previous
1
2
3
4
5
6
7
8
...
11
Next »
45%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="http://activemq.apache.org/schema/core" brokerName="localhost" useJmx="true"> 10
11
12
13 14
15
45%
Building more efficient database applications with a graph database
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
.createRelationshipTo(cologne, RelTypes.reachable); 14 Relationship a1_k_do = cologne.createRelationshipTo(dortmund, RelTypes.reachable);
15
// Save data and quit: 16 tx.success(); 17 tx.finish(); 18 database
45%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
c/s virtual 12 13 Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE 14 Raw: 723 c/s real, 723 c/s virtual
15
16 Benchmarking: Kerberos AFS DES [48/64 4K]... DONE 17 Short: 378501 c/s real
45%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
100.net) 56 data bytes 03 64 bytes from iy-in-x63.1e100.net: icmp_seq=1 ttl=
52
time=99.6 ms 04 64 bytes from iy-in-x63.1e100.net: icmp_seq=2 ttl=
52
time=100 ms 05 64 bytes from iy-in-x63.1e100.net: icmp
45%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/>
15
XML Sections The configuration file comprises several sections. Global parameters, such as the cluster name are located in the cluster section; instructions for the CMAN plugin
45%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
"creating" $vmname 09 10 virsh suspend rhstorage 11 virt-clone -o rhstorage -n $vmname -f /var/lib/libvirt/images/$vmname.qcow 12 virsh resume rhstorage 13 14 oldmac="
52
:54:00:B4:DF:EB"
15
newmac
45%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
11 PasswordAuthentication yes 12 PermitEmptyPasswords no 13 PermitRootLogin no 14 PermitTunnel no
15
PermitUserEnvironment no 16 Port 2202 17 Protocol 2 18 StrictModes yes 19
45%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
*instanz,char __user *user, size_t count, loff_t *offset ) 14 {
15
unsigned long not_copied, to_copy; 16 17 to_copy = min( count, strlen(hello_world)+1 ); 18 not
45%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10 6d:2c:04:dd:bf:b2:de:e1:fc:
52
:e9:7f:59:10:98:bb khess@windows 11 The key's randomart image is: 12 +--[ RSA 2048]----+ 13 | .. . o
45%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
pressing Save , whenever a client on the LAN tries to access the Internet, the user is automatically shown the login screen that you can see in Figure
15
. The user needs to enter the credentials stored
« Previous
1
2
3
4
5
6
7
8
...
11
Next »