search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 00s Llorente 22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(29)
Keywords
« Previous
1
2
3
75%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
aes256-sha1; 13 } 14 vpn racoonvpn { 15 bind-interface st
0.0
; 16 ike { 17 gateway racoon; 18 proxy-identity { 19 local 192.168.1.0/24;
20
remote
75%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -
s
defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -
s
20
instructs sshguard ...
3
75%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable
X
.509 certificates [
3
] that automatically expire. You can
73%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
runs with root privileges. The exceptions are Mac OS
X
and Solaris, where the user only needs access privileges for the network interface card device file. By default, Tcpdump reads all the data
73%
Archiving email and documents for small businesses
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
}
20
\usepackage{ngerman} 21 \usepackage[official,right]{eurosym}
22
\\\begin{document}" > att1.tex 23 echo "\end{document}" > att
3
.tex 24 25 # Merge Latex file components 26 27 cat att1.tex searchkey
73%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
/sda
20
Account information: 21 ACL information:
22
ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single
73%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19
20
if (args.length !=
3
&& args.length != 5) 21 {
22
System
71%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
Amazon started converting its excess computational power to cash some time ago. Under such names as EC2 (Elastic Computing Cloud),
S
3
(Simple Storage Service), and SimpleDB, the book and coffee
71%
The RADOS object store and Ceph filesystem
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
addr = 10.42.0.101:6789 14 [mon.b] 15 host = bob 16 mon addr = 10.42.0.102:6789 17 [mon.c] 18 host = charlie 19 mon addr = 10.42.0.103:6789
20
[osd.0] 21 host = alice
22
[osd.1] 23 host
« Previous
1
2
3