search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb%3 08 Llorente 22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(56)
Keywords
« Previous
1
2
3
4
5
6
Next »
92%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/vol1 2G 9.72G 65.
3
M - 05 05 # zfs get volsize mypool/vol1 06 06 NAME PROPERTY VALUE SOURCE 07 07 mypool/vol1 volsize 2G -
08
09 The volume is currently 2GB. The following commands expand it to
3
GB. 10 11
91%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
end (Figure 2). Listing
3
update-dns 01 #!/usr/bin/perl 02 03 use DBI; 04 05 $db_user = "powerdns"; 06 $db_passwd = "powerpass"; 07
08
$hostname = $ARGV[0] . ".my.org"; 09 $ip = $ARGV[1
91%
The fail2ban intrusion prevention framework
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes. In simple terms, fail2ban [
3
] keeps a close eye on your
91%
Server virtualization with VirtualBox
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
apache2-mpm-prefork apache2-utils apache
2.2
-bin apache
2.2
-commona pache2-doc apache2-suexec libapache2-mod-php5 libapr1 libaprutil1 libaprutil1-dbd-sqlite
3
libaprutil1-ldap libapr1 libaprutil1 libaprutil1
91%
Using Expect scripts to automate tasks
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
certain things. Two reasons a script
08
# might fail are: 09 # 10 # 1) timing - A surprising number of programs (rn, ksh, zsh, telnet, 11 # etc.) and devices discard or ignore keystrokes that arrive "too
91%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
. For other distros, the Ratbox source files are available at the project website [
3
]. After unzipping, you can install with the classic three-command trick of configure, make, and make install. That Ratbox
91%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.com/dtd/web-app_2_
3
.dtd"> 05 06
07
08
90%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
with ; or \g. 03 Your MySQL connection id is
3
to server version 5.0.
22
01 Type 'help;' or '\h' for help. Type '\c' to clear the buffer. 01 mysql> Your connection to the MySQL server on the remote Unix
90%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
90%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [
3
], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
« Previous
1
2
3
4
5
6
Next »