search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(242)
Article
(66)
News
(2)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
32
Next »
18%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.9 20 # user setup 21 user --name=example-user --password=
--iscrypted --gecos="example-user"
22
# Disk partitioning
18%
Open source multipoint VPN with VyOS
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
even added a command-line interface (CLI) with the feel of a commercial router, completing the free DMVPN router. Unfortunately, Brocade acquired Vyatta in
2012
and put it under a commercial license
18%
Sort out your SSH configs
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
, you should see the client config file ssh_config, which I'll get to a little later. If you've just installed the SSH server and want to be sure that it's listening, you can use the command lsof -i :
22
18%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home
»
Archive
»
2016
»
Issue 33: IPv6...
»
and monitoring. You can thus centrally manage your virtual switches. Once the service is installed and set up, you can manage your networks with System Center Virtual Machine Manager
2012
R2 or 2016, as well
18%
Automation Scripting with PHP
16.10.2012
Home
»
Articles
»
to the screen (STDOUT; line 15). Listing 1: SSH Script 01 #!/usr/bin/php 02 03 04 $ssh = ssh2_connect('192.168.1.85',
22
); 05 ssh2_auth_password($ssh, 'khess', 'password'); 06 $stream = ssh2_exec
18%
Cross-Vendor IPsec
25.10.2011
Home
»
Articles
»
,
256
-bit AES for Phase 1, and because it was unclear at the start of the test which implementation could handle which algorithm or PFS groups. In Phase 2, I wanted to use AEA
256
, SHA1, and PFS2
18%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
192.168.2.0/24; 21 service any;
22
} 23 IPsec-policy pfs2-aes
256
-sha1; 24 } 25 } 26 } 27 } Again you can reuse the proposal and the policy. Assuming
18%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home
»
Archive
»
2017
»
Issue 40: Lean...
»
Server
2012
, the OS should have at least 2GB of RAM available, or 4GB on a physical system with a large amount of RAM. In Hyper-V virtualization does the dynamic memory configuration comply with best
18%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
. As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port
22
), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
18%
Generate VM Images with virt-builder
15.04.2014
Home
»
Articles
»
the following command when you get there: wget http://libguestfs.org/download/builder/fedora-19.xz The image is only 164
MB
in size, so the download is done quickly. Back in the main directory of the libguestfs
« Previous
1
...
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
32
Next »