search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%3%A9n Llorente 12
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(39)
Keywords
« Previous
1
2
3
4
Next »
15%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm
9
TRn
9
YIz
A
47T
3
JHPK4xVOzYu/8nc
3
wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk
9
DU
3
zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
15%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
15%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
15%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
: " . $password . "\
n
"; 13 echo "Hash: " . $hashvalue . "\
n
"; 14 15 // Compare $password with the store has: 16 $passwordfromdb = '$P$
9
IQRaTwmfeRo7ud
9
Fh4E2PdI0S
3
r.L0'; 17 // stored hash, would
15%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
07 if [ -
n
"$OCF_RESKEY_monitor_sipuri" ]; then 08 check_binary sipsak 09 fi 10 11 if [ ! -f $OCF_RESKEY_config ]; then
12
ocf_log err "Config $OCF_RESKEY_config doesn
15%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
.0 2.2.x. 2.6.30 through 2.6.35 Debian 6 (Squeeze) 2.
3
.x. 2.6.36 through
3
.0 Ubuntu 11.10 2.4.x.
3
.1. openSUSE
12
.1 2.5.x.
3
...
9
15%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
15%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 09 bb:0f:e
3
:7f:
3
e:ab:c
3
:5d:32:78:85:04:
a
2:da:f1:61 root@host1 You need to distribute the public part, that is the /root/.ssh/id_rsa_cluster.pub file, to all nodes in the cluster. The Strict
15%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
version [
9
]. Listing
3
/etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.
3
255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
15%
Exploring Nmap's scripting engine
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
.have_ssl() then 11 return false
12
end 13 return true 14 end The portrule in Listing 2 creates the variables svc.std and svc.ssl as associative arrays (lines 2 and
3
) and then checks to see
« Previous
1
2
3
4
Next »