search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
谷歌推广霸屏【电报e1000】google外推推广.ufw.0x00
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(30)
Keywords
« Previous
1
2
3
Next »
90%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
, 378501 c/s virtual 18 Long: 1063K c/s real, 1063K c/s virtual 19
20
Benchmarking: LM DES [64/64 BS]... DONE 21 Raw: 8214K c/s real, 8214K c/s virtual 22 23 Benchmarking: NT MD4 [Generic 1
x
]... DONE 24
90%
Getting started with AI
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
with a
100
percent (1.
0
) probability in a specific class and a zero in all other classes. Neural networks generalize; they don't give you a
100
percent specific answer. However, if you look at all
89%
Intruder detection with tcpdump
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
.g., 192.168.
0.0
/24). # tcpdump net 192.168.1.1/24 Src, dst Only capture packets from a source or destination. # tcpdump src 192.168.
100
.234# tcpdump dst 10.10.24.56 host
89%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/share/doc/kernel-doc/Documentation/networking/bonding.txt ). Listing 5 ifcfg-bond
0
01 DEVICE=bond
0
02 IPADDR=192.168.10.200 03 NETMASK=255.255.255.
0
04 ONBOOT=yes 05 USERCTL=no 06 BONDING_OPTS="mode=1 miimon=
100
" When the system is running, the /proc ...
0
89%
GNU tools under Windows
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
Many administrators consider Bash and the GNU tools to be indispensable standard utilities for routine administrative tasks. For more than
20
years, the Bash Unix/Linux command shell, developed
88%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
141.
20
.108.124 07 active_checks_enabled 1 08 passive_checks_enabled
0
09 max_check_attempts 3 10 check_command check-host-alive 11
88%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (3/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard
88%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
13 pkcs11-id 'Aladdin\
x
20
Knowledge\
x
20
Systems\
x
20
Ltd\xxx/eToken/0000xxxx/eToken\xxx\xxx\xxxxxx/xxxx' 14 15 management 127.
0.0
.1 4711 16 management-query-passwords 17 18 cipher BF-CBC 19 comp-lzo
20
88%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
on the guest system look similar to Listing 2. Listing 2 rc.local 01 #!/bin/sh 02 dnsserver=192.168.111.
20
03 hostname=`hostname` 04 ip=`LANG=C /sbin/ifconfig eth
0
| grep "inet addr" | awk -F
88%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
_config 03 bash#> vi sshd_config 04 AllowTcpForwarding no 05 ClientAliveCountMax 3 06 ClientAliveInterval
0
07 Compression delayed 08 LoginGraceTime 60s 09 LogLevel DEBUG3 10 MaxAuthTries 2
« Previous
1
2
3
Next »