search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
德州俱乐部申请(网址dv9500.com)德州俱乐部申请(网址dv9500.com)w7s
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(16)
Keywords
« Previous
1
2
84%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
1 split.sh 01 #! /bin/sh 02 for i in `ls -1 archive/cur` 03 do 04 # Define name component for the individual mail directory 05 pref=`date +%Y-%m-%d-%H-%M-%
S
` 06 07 # Push mail
84%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
ban/filter.d/sshd.conf file. Don't worry: this first example isn't too trying. The two salient lines in the config file are as follows: failregex = ^%(__prefix_line)
s
Failed (?:password
83%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud),
S
3 (Simple Storage Service), and SimpleDB, the book and coffee
80%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
, which already has the required ports open at the server and firewall(
s
). We recommend not using Yum for every Red Hat Enterprise Linux (RHEL) server because it opens too many systems to intrusion, which
79%
Apache 2.4 with mod_lua
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
of methods, which you can use to output the page to be served up. To see how this works, check out Listing 1 [
7
] with the obligatory Hello World example. Comments in Lua always start with two hyphens. r
79%
Flexible user authentication with PAM
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990
s
by Sun Microsystems, PAM is available on most Unix-style systems
« Previous
1
2