search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(253)
News
(6)
Article
(5)
Keywords
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
...
27
Next »
18%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Python code designed with threading is to use the built-in multiprocessing package included in Python from version 2.
6
on. This package provides an API similar to the threading Python module. Although
18%
Strategies for routing voice calls around a firewall
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
follows the hops collected in the Via headers from Bob back to Alice. When Bob accepts the call, he sends a 200 OK (
6
). In contrast to the previous responses, this OK will contain a Contact header
18%
What tools do intruders use to
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
under Windows , which contains a default collection of entities (see Figure
6
). Figure
6
: Managing reconnaissance information with Maltego. Select
18%
Managing Active Directory at the command line
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
is not installed on any other systems. Instead, the Remote Server Administration Tools (RSAT) module is used [5] [
6
]. The version for Windows 7 not only installs a full set of tools for GUI-based administration
18%
Check your VoIP networks with SIPVicious and sngrep
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
(6192 bits), 774 bytes captured (6192 bits) Ethernet II, Src: 00:1a:2b:3c:4d:5e, Dst: 00:
6
f:7g:8h:9i:0j Internet Protocol Version 4, Src: 192.168.1.101, Dst: 192.168.1.104 User Datagram Protocol, Src Port
18%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
to S3 will be successful (Listing
6
). Listing
6
Backup ActionSet cat <
18%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
from serial CPU logic to CPU instructions operating on multiple data (such as AVX [
6
]) or a GPU's finer grained parallelism. Many strategies are liable to backfire when switching the underlying choices
18%
Centralized software repository management
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
-client consumer bind --repoid Fedora14-x86_64 command, which tells Pulp to create a new pulp.conf configuration file below /etc/yum.repos.d to point to the new repository on the server (Listing
6
). If the client
18%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
the Performance tab on the secondary tab list. I accepted the default settings for the notifications that I wanted for this particular system (Figure
6
). Figure 5
18%
Port-based access protection with NAP and 802.1X
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
network (Figure
6
). The wizard then shows you that a total of six policies are being created to define NPS management. Figure
6
: Clients that do not meet
« Previous
1
...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
...
27
Next »