search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 400 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(53)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
Next »
69%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
, 378501 c/s virtual 18 Long: 1063K c/s real, 1063K c/s virtual 19
20
Benchmarking: LM DES [64/64 BS]... DONE 21 Raw: 8214K c/s real, 8214K c/s virtual
22
23 Benchmarking: NT MD4 [Generic 1
x
]... DONE 24
69%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="retry" value="
3
"/> 18
19
20
21
68%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
initial tests are quite reasonable: 1GB memory, a virtual CPU, about
20
GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun
x
VM VirtualBox is a good choice
68%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
() 15 p1.start() 16 p
3
.start() 17 18 p1.join() 19 p2.join()
20
p
3
.join() To see that multiprocessing creates multiple subprocesses, run the code shown in Listing 2 (counting
68%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
under the 18 # following copyright: 19 #
20
# (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors
22
# 23 # See usage() function below for more details ... 24 # 25
68%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable
X
.509 certificates [
3
] that automatically expire. You can
68%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
X
4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (
20
GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel
X
68%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
-address remotelan; 16 application any; 17 } 18 then { 19 permit;
20
} 21 }
22
} You need to define trustnet and remotelan in the zone address book because Juniper only processes
68%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard ...
3
67%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
qemu_
x
86_defconfigmake menuconfig (build-option, Kernel-Version
3
.2, gdb, tty1)makemake linux-menuconfig (debug info) make
3
. Compile the module and copy it to the root directory:cd driverexport CROSS
« Previous
1
2
3
4
5
6
Next »