search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(54)
Keywords
« Previous
1
2
3
4
5
6
Next »
87%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="sdk.dir" location="../appengine-java-sdk-1.5.
0
.1" /> 03 04
05 06
07
08
86%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
-incremental:lanman passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 guesses:
0
time: 1:04:04:
08
(3) c/s: 10927 trying: gmugoky - gmugok2 04 guesses:
0
time: 1:09:25:10 (3
86%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
.Xensource.xenapi.Connection; 07 import com.Xensource.xenapi.Host;
08
import com.Xensource.xenapi.Session; 09 import com.Xensource.xenapi.Task; 10 11 import de.pm.xenserver.utils.Server; 12
13
public class TestAPI { 14 15
86%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
08
default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11 12 clean:
13
rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
85%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_NOT_RUNNING
08
fi 09 10 pid=`cat $ASTRUNDIR/asterisk.pid` 11 ocf_run kill -s
0
$pid 12 rc=$?
13
14 if [ $rc -eq
0
]; then 15 if ocf_is_true "$OCF_RESKEY_realtime"; then 16
85%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer";
13
$node2 = "AppServer"; 14 $node3 = "DBMServer"; 15 $think =
0.0
* 1e-3; # as per test system 16 $dtime =
2.2
* 1e-3; # dummy service time 17 18
85%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
endpoint1=192.168.80.
0
/24 07 endpoint2=192.168.2.
0
/24
08
action=requireinrequireout 09 auth1=computerpsk 10 auth1psk="test123" 11 qmsecmethods=esp:sha
1-3
des 12 qmpfs=dhgroup2 If you need
85%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
:
09 Content-Type: application/sdp 10 Content-Length: 142 11 12 v=
0
13
o=alice 53655765 2353687637 IN IP4 pc33.atlanta.com 14 s=- 15 t=
0
0
16 c=IN IP4 pc33.atlanta.com 17 ...
0
85%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
is MySQL or SQLite. 128
MB
disk space and 256
MB
RAM are the available hardware resources in a shared-hosting environment. If you need more, you have to upgrade to the Flex level, which means having
85%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
: all cores
0
x40: core: this core
0
x30: prefetch: all inclusive
0
x10: prefetch: Hardware prefetch only
0
x00: prefetch: exclude hardware prefetch
0
x
08
: (M)ESI: Modified
0
x04: M
« Previous
1
2
3
4
5
6
Next »