search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(226)
Article
(85)
Blog post
(2)
News
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
14
15
16
17
18
19
20
21
22
23
24
25
26
27
...
32
Next »
27%
Introduction to LVM
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
to modify their paths or work with alias constructions, or they can replace the disk(
s
) with a larger model and restore a backup of the complete system to the new disk. This last approach means
27%
Automate your VMware configuration with Puppet
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only
3
GB of RAM and two processor cores are required, the installation
27%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home
»
Archive
»
2015
»
Issue 25: Safe...
»
the network traffic has full access to the content of the message, so anyone who wants privacy needs encryption. PGP and
S
/MIME or SSL and STARTTLS are suitable methods for encrypting email. The first two
27%
Cloud protection with Windows Azure Backup
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
in Windows Azure; you will find this on the Azure portal [
3
]. The familiar Windows backup interface is used for backing up and restoring. You can also control the process in Windows PowerShell; a separate
27%
Solving the security problems of encrypted DNS
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
2fuTVWnj7LDsEh
3
NzrhjGYlhWmtvrXg
3
mlFelz/MZ 08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC 09 mh5C8E7xSw== 10 mozilla.org. 6074 IN DNSKEY
256
3
7 11 AwEAAcY1VDPt
27%
The Cuckoo sandboxing malware analysis tool
17.04.2017
Home
»
Archive
»
2017
»
Issue 38: .NET...
»
. Immediately after posting a sample, Cuckoo outputs appropriate messages on the console (Listing
3
). Listing
3
Cuckoo Output 2016-07-25 17:37:
00
,192 [lib.cuckoo.core.scheduler] INFO: Starting
27%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -
s
.data data_address -
s
.bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
27%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
5221548db 58 seconds ago 5.67
MB
80dc7d447a48 About a minute ago 167
MB
alpine
3
.9 78a2ce922f86 5 months ago 5.55
MB
The command you really
27%
Secure your data channel with stunnel
25.03.2020
Home
»
Archive
»
2020
»
Issue 56: Secur...
»
ZJOUoUsZGlkk client2:q0eL78zFrbnESW6c/F0qit5MNCp
S
8IBgyh1BdXiyyuI client
3
:zkq8eT31Nib
3
IHWfp0yyu15BCW52VMbY8+LhVUt
3
ylA The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file: client1:Wf
27%
Kernel and driver development for the Linux kernel
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
proc_create_data: Instead of
S
_IRUGO, you need
S
_IRUGO |
S
_IWUGO. Finally, four lines need to be added to the program header: #include
static char kernel_buffer[
256
]; #define TEXT
« Previous
1
...
14
15
16
17
18
19
20
21
22
23
24
25
26
27
...
32
Next »