search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(46)
Keywords
« Previous
1
2
3
4
5
Next »
86%
Configuring XP Mode in Windows 7
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
license and the installation medium to do so. The path to the VHD container files is also available in the guest context if you configure file and folder sharing when you set up XP Mode (Figure
3
). The
C
...
3
86%
Reading email in the browser with Horde
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
comes with an Ajax interface that is similar to a
normal
desktop application in terms of usability (Figure
3
). Figure
3
: Dynamic view in the email
86%
Using AppLocker to block applications on networks
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.
com
[
3
] for a video that might help you set up your environment
86%
Virtualization with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
on the virtual machines that Qemu provides without fighting over the physical network interface (Figure 1). Figure 1: Thanks to KVM, Windows 7 and openSUSE 11.
3
86%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:
c
3
:92:44:ba: 1a:df:d7:9
c
:44:b2:5b:73:52:09. Are you sure you want to continue
85%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
. Infos OProfile project homepage: http://oprofile.sourceforge.net/news Kernel debuginfo information: http://fedoraproject.org/wiki/StackTraces#What_are_debuginfo_rpms.2
C
_and_how_do_I_get_them.
3
F
84%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
.
Normally
, it's located in /usr/sbin: ./configure --with-firewall=iptables --with-iptables=/usr/sbin On openSUSE 11.
3
and Debian, the iptables command requires root user access. For this reason, you ...
3
84%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.
com
/dtd/web-app_2_
3
.dtd"> 05 06
07
08
84%
From Out of the Blue
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
://kerneltrap.org/node/4785 iknowthis – System call fuzzer: http://code.google.
com
/p/iknowthis full-nelson.
c
: http://seclists.org/fulldisclosure/2010/Dec/85 Linux Kernel mailing list: https://lkml.org/ Smash ...
3
84%
Monitoring KVM instances with Opsview
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [
3
« Previous
1
2
3
4
5
Next »