search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub 12%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(33)
Keywords
« Previous
1
2
3
4
Next »
85%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
-b81d-c42b-c008-
a
70649501262 05 # stmfadm add-view -h myiscsiclient -t myiscsiserver -
n
1 600144f05f71070000004bc999020002 # cat /etc/iscsi/initiatorname.iscsi InitiatorName=iqn.1993-08.org
84%
Managing FOSS applications on AIX
27.05.2025
Home
»
Archive
»
2025
»
Issue 87: Light...
»
]SRPMS/ * [
9
]contrib/ * [10]docs/ * [11]ezinstall/ * [
12
]installp/ * [13]usr/ ...etc... The output from lynx confirms the HTTPd server is functioning. DNF clients can now
83%
Building a port scanner in Python
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
://linuxnewmedia.thegood.cloud/s/
9
n
FQcFb2p8oRMEJ The Author Andrea Ciarrocchi is a technology enthusiast. Visit his homepage at https://andreaciarrocchi.altervista.org.
83%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
the computer on which it is running. The first thing you need to have in place is Ruby version 1.8.5 through 1.
9
.2 (with SSL bindings). Add to this, RubyGems, which will want to build various extensions
82%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
82%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
use_regex = 0
22
load_monitor = rup 23 scheduler = rr 24 protocol = tcp
25
timeout = 6 26 reentry = 15 27 quiesce_server = 1 28 server webserver1 { 29 address
82%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
82%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
] 13 rw=randread 14 runtime=60 15 16 [sequentialread] 17 stonewall 18 rw=read 19 runtime=60 20 21 [randomwrite]
22
stonewall 23 rw=randwrite 24 runtime=60
25
26 [sequentialread] 27 stonewall 28 rw
81%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
_world[]="Hello World\
n
"; 08 static dev_t hello_dev_number; 09 static struct cdev *driver_object; 10 static struct class *hello_class; 11 static struct device *hello_dev;
12
13 static ssize_t driver_read( struct file
80%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[
a
-z]?eth[0-
9
« Previous
1
2
3
4
Next »