search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3 08 Llorente"5432
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(57)
Keywords
« Previous
1
2
3
4
5
6
Next »
94%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.com/dtd/web-app_2_
3
.dtd"> 05 06
07
08
94%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
be replaced solely with the sshd configuration directives shown in Listing
3
. Line 16 specifies that SFTP will listen on port 2202 instead of the default SSH port
22
. This option is configurable and left ...
3
94%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
container. As its popularity increased and the server became more widespread, the JBoss community expanded and extended the product until, finally, application server version
3
(AS
3
) became a full
93%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
$spin
08
@$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
93%
Reading and understanding database execution plans
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
the explain plan for command in combination with the DBMS_XPLAN.DISPLAY function call (see Example 1). Example 1: Oracle Execution Plan 01 SQL> explain plan for<+>1<+> 02 2> SELECT * 03
3
> FROM sales
93%
Clustering with OpenAIS and Corosync
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
ID. Version
3
.0 of the cluster suite (in RHEL 6 and Fedora 10 or later), replaces OpenAIS with Corosync [
3
]. Viewed superficially, not too many changes are seen between the two cluster managers ...
3
93%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
93%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [
3
], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
93%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
-incremental:lanman passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 guesses: 0 time: 1:04:04:
08
(
3
) c/s: 10927 trying: gmugoky - gmugok2 04 guesses: 0 time: 1:09:25:10 (
3
93%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
filesystem using, for example: Listing 1 Makefile 01 ifneq ($(KERNELRELEASE),) 02 obj-m := hello.o 03 04 else 05 PWD := $(shell pwd) 06 KDIR := ~/buildroot-2011.
08
/output/build/linux-
3
.1/ 07
« Previous
1
2
3
4
5
6
Next »