search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb%3%A9n Llorente 22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(36)
Keywords
« Previous
1
2
3
4
Next »
85%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
ScanOptions 21 {
22
Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.
A
4, 25 Dpi = 300 26 }; 27 28 var images = new List
84%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
84%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S
3
r.L0'; 17 // stored hash, would
83%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
.894212] vmware-hostd[3870]: segfault at 2100001c4f ip 0000003c0cb32ad0 sp 00007f3889e
9
cb88 error 4 in libc-2.12.90.so[
3
c0ca00000+19
a
000] Analysis and Plan A Initial analysis proved that the VMware ...
3
83%
Monitoring for small and medium-sized companies compared
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
scalability in particular: From environments with
200
systems in small to medium-sized enterprises through 70,000 interfaces in an enterprise environment, OpenNMS [1] scales without any problems, says
83%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
83%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
83%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm
9
TRn
9
YIz
A
47T
3
JHPK4xVOzYu/8nc
3
wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk
9
DU
3
zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
82%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
82%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[
a
-z]?eth[0-
9
« Previous
1
2
3
4
Next »