18%
30.11.2025
[2], who run their ad services on top of MySQL or from MySQL specialists like Percona [3], whose claim to fame is the "MySQL Performance Blog" [4] (standard reading for anyone interested in My
18%
30.11.2025
(Amanda) [2] is one of the most widely used open source backup tools. The software development is "sponsored" by the company Zmanda [3], which provides an "enterprise" version of Amanda that you can
18%
30.11.2025
and development on your local system.
Another free source of virtual appliances is the VMware Virtual Appliance Marketplace [3]. This site has tons of pre-rolled virtual appliances for VMware – everything from
18%
03.09.2013
and data, PCoIP can allow or prohibit looped USB devices explicitly.
Workstation with Host Card
With a host card, you can turn a powerful Windows or Linux PC (and probably Macintosh computers from 2013Q3
18%
17.09.2013
-keygen -t rsa
(optionally, ssh-keygen -t dsa
) to generate a new RSA or DSA key pair of public and private keys (Figure 3).
Figure 3: Generating a RSA key
18%
26.10.2012
, or simulated by the honeypot. The set of services visible to the attacker on the target system is equal to the total set of the services offered by the server and the analysis system (Figures 3 and 4
18%
22.01.2013
agent. This agent basically consists of an input mask (Figure 3). Each desktop environment can supply its own authentication agent.
Figure 3
18%
19.12.2012
development for several years. In early 2013, the developers from the Institute of Compute Technology (ICT) at the Chinese Academy of Sciences will present the latest development called the Godson-3B
18%
24.06.2013
server (hosting)
Resolving DNS server (caching)
API to provision zones and records
DNSSEC support (as of 3.x)
Web-based management options
DNS data stored in plaintext (BIND compatible
18%
02.07.2014
:
pdsh -w host[1-11]
pdsh -w host[1-4,8-11]
In the first case, pdsh expands the host range to host1, host2, host3, …, host11.
In the second case, it expands the hosts similarly (host1, host2, host3, host