search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%256mb 12%A9n Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(66)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
77%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S3r.L0'; 17 // stored hash, would
77%
Develop a simple scanning application with the NAPS2 SDK
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
ScanOptions 21 {
22
Device = device, 23 PaperSource = PaperSource.Feeder, 24 PageSize = PageSize.
A
4, 25 Dpi = 300 26 }; 27 28 var images = new List
77%
ARP cache poisoning and packet sniffing
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Destination MAC address Listing 1 Nemesis arp Packets 01 $ while true 02 > do 03 > sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 -D 192.168.1.133 -h 00:
22
:6E:71:04:BB -m 00:0C:29:B2:78:
9
77%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
.33 164.69 0.75 rand_mat_stat 3.37 39.34 11.64 54.54
22
.07 8.
12
rand_mat_mul 1.00 1.18 0.70 1.65 8
76%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm
9
TRn
9
YIz
A
47T3JHPK4xVOzYu/8nc3wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk
9
DU3zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
76%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
the Ubuntu Precise (
12
.04) Universe repository and as a package for Debian Sid. To install the server on Linux, you first need to install the necessary packages; the example here uses an Ubuntu distribution
76%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
_dlm] root 3467 7 0 20:07 ? 00:00:00 [o2net] root 3965 7 0 20:24 ? 00:00:00 [ocfs2_wq] root 7921 7 0
22
:40 ? 00:00:00 [o2hb-BD5
A
574EC8] root 7935 7
76%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
686 oprofile-0.
9
.5-4.fc
12
.i686 To profile the kernel, you need to tell OProfile where the kernel image is located with the --vmlinux option: opcontrol --setup --vmlinux=/usr/lib/debug/lib/ modules
76%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_world[]="Hello World\
n
"; 08 static dev_t hello_dev_number; 09 static struct cdev *driver_object; 10 static struct class *hello_class; 11 static struct device *hello_dev;
12
13 static ssize_t driver_read( struct file
76%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
« Previous
1
2
3
4
5
6
7
Next »