search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
德州俱乐部申请(网址dv9500.com)德州俱乐部申请(网址dv9500.com)w7s
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(21)
Keywords
« Previous
1
2
3
Next »
66%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Figure 1: A simple test with two jobs that Fio executes one after another. While Fio is executing the workload, it tells you about the progress it is making: Jobs: 1 (f=1): [rP] [64.
7
% done] [16948K
66%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
In the summer of 2007, Citrix invested around US$
500
million to acquire XenSource, the developers of the free Xen hypervisor. XenSource and its free hypervisor form the basis for what is probably
66%
Give your servers the once over with Nmap
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
ADDRESS [Cut first seven hops for brevity] 8 10.59 so-4-2-0.mpr3.pao1.us.above.net (64.125.28.142) 9 11.00 metro0.sv.svcolo.
com
(208.185.168.173) 10 9
65%
Active Directory overview
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Microsoft software is so widespread in the enterprise environment that it's easy to forget that Windows played a minimal role on the server operating system market back in the 1990
s
. The market
65%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
1 split.sh 01 #! /bin/sh 02 for i in `ls -1 archive/cur` 03 do 04 # Define name component for the individual mail directory 05 pref=`date +%Y-%m-%d-%H-%M-%
S
` 06 07 # Push mail
65%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
ban/filter.d/sshd.conf file. Don't worry: this first example isn't too trying. The two salient lines in the config file are as follows: failregex = ^%(__prefix_line)
s
Failed (?:password
64%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud),
S
3 (Simple Storage Service), and SimpleDB, the book and coffee
62%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
, which already has the required ports open at the server and firewall(
s
). We recommend not using Yum for every Red Hat Enterprise Linux (RHEL) server because it opens too many systems to intrusion, which
61%
Apache 2.4 with mod_lua
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
of methods, which you can use to output the page to be served up. To see how this works, check out Listing 1 [
7
] with the obligatory Hello World example. Comments in Lua always start with two hyphens. r
61%
Flexible user authentication with PAM
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
but from a directory service. This task can be simplified by deploying PAM [1]. Modular Authentication Originally developed in the mid-1990
s
by Sun Microsystems, PAM is available on most Unix-style systems
« Previous
1
2
3
Next »