search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(178)
Article
(57)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Next »
15%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
], Fabric [
3
], or Capistrano [4], MCollective relies on middleware based on the publish/subscribe method to launch jobs on various nodes. The middleware supported by the framework can be any kind of STOMP
15%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
SeverityValue =
3
; else $SyslogSeverityValue =
6
; 20 21 # The name of the file is also sent with the file
22
Exec $FileName = file_name(); 23 24 # The SourceName variable is set by default to 'NXLOG'. To send
15%
Server virtualization with Citrix XenServer
04.08.2011
Home
»
CloudAge
»
Articles
»
the biggest rentable cloud today: the Amazon Web Service. Based on this extremely mature technology, Citrix launched Version 5.
6
of its XenServer product family in May 2010. XenServer, the product built around ... Version 5.
6
of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
15%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length !=
3
&& args.length != 5) 21 {
22
System ... Version 5.
6
of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
15%
Slipping your pen test past antivirus protection with Veil-Evasion
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
, and BackDoor Factory. Native Stagers Stagers manage an attack on the target system as follows [
3
]: 1. Establish a socket connection to the Metasploit handler (this will happen as the stage 1 victim
15%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
are available to let administrators manage jails on the host system [
6
]. Here's a brief look: jail [-i] [-l -u
| -U
]
: Starts a jail
15%
VAX emulation with OpenVMS
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
downloaded the approximately
3
MB
ZIP file, create a folder before you unpack, because the archive does not contain one. If you simply unzip, all the files and directories end up in the current directory
15%
Supercharge your software upgrade routine
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
installed Ubuntu MATE
22.04.3
platform), first install all the requirements for compiling and deploying topgrade-rs (referred to as Topgrade moving forward): curl, git, pkg-config, and rust. Once in place
15%
What's your status (page)?
28.11.2023
Home
»
Archive
»
2023
»
Issue 78: Domai...
»
.json files (Listings 1 and 2) [2] to launch a Monitoror stack and supply its configuration, respectively. Listing 1 monitoror_stack.yml 01 version: '
3
.5' 02 services: 03 monitoror: 04
15%
Have a Bash with the Zing network utility
25.09.2023
Home
»
Archive
»
2023
»
Issue 77: Secur...
»
: 55 ms. Port: 80: op 2.1. 10.0.0.23 80 Time: 26 ms. Port: 80: op
2.2
. 10.0.0.23 80 Time: 56 ms. Port: 80: op
3
.1. 10.0.0.23 80 Time: 25 ms. Port: 80: op
3
.2. 10.0.0.23 80 Time: 48 ms. Port: 80: op 4
« Previous
1
...
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Next »