search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(19)
Keywords
« Previous
1
2
28%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
c/s virtual
12
13
Benchmarking: OpenBSD Blowfish (x32) [32/64 X2]... DONE 14 Raw: 723 c/s real, 723 c/s virtual 15 16 Benchmarking: Kerberos AFS DES [48/64 4K]... DONE 17 Short: 378501 c/s real
28%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
the Buffer 01 [global] 02 ioengine=libaio 03 direct=1 04 filename=testfile 05 size=2g 06 bs=4m 07 08 refill_buffers=1 09 10 [write] 11 rw=write
12
write_bw_log
13
14 [read] 15 stonewall 16 rw=read 17 write
28%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
28%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
27%
An IT nomad's daily diary
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
print
13
else: 14 print "The system configuration file %s does not exist, aborting." % cblr_systems 15 print 16 sys.exit(1) 17 18 column_header = [ "name","os","eth
0
-mac
25%
vSphere 5 vs. XenServer 6
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
[2] by VMware started to move into the server racks in the summer of 2011, but while I was researching this article, Citrix suddenly burst onto the scene with the XenServer 6.
0
release [3
25%
Intrusion detection with Prelude
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
11
12
13
Order allow,deny 14 Allow from all 15 16 17 Alias /prewikka/ /usr/share/prewikka/htdocs/ 18 ScriptAlias / /usr/share/prewikka/cgi-bin/prewikka.cgi 19
24%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
that it locates: oops::
000
:100::/:/bin/sh This password file entry allows someone to log in as the root-equivalent user oops without a password: grep '.*:.*:00*:' /etc/passwd | awk -F: 'BEGIN {n=
0
}; $1
24%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
AdvAutonomous on; 10 AdvRouterAddr off; 11 };
12
13
}; IPv6 Attacks IPv6 basically suffers from all the existing classes of attacks against IPv4 and also introduces some new weaknesses
« Previous
1
2