search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcomm%3 400 Llorente"22
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(57)
Article
(2)
Keywords
« Previous
1
2
3
4
5
6
Next »
69%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
, 378501 c/s virtual 18 Long: 1063K c/s real, 1063K c/s virtual 19
20
Benchmarking: LM DES [64/64 BS]... DONE 21 Raw: 8214K c/s real, 8214K c/s virtual
22
23 Benchmarking: NT MD4 [Generic 1
x
]... DONE 24
69%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="retry" value="
3
"/> 18
19
20
21
68%
Storage system with OpenSolaris and Comstar
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
initial tests are quite reasonable: 1GB memory, a virtual CPU, about
20
GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun
x
VM VirtualBox is a good choice
68%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
() 15 p1.start() 16 p
3
.start() 17 18 p1.join() 19 p2.join()
20
p
3
.join() To see that multiprocessing creates multiple subprocesses, run the code shown in Listing 2 (counting
68%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
under the 18 # following copyright: 19 #
20
# (c) 2002-2005 International Business Machines, Inc. 21 # 2005-2010 Linux-HA contributors
22
# 23 # See usage() function below for more details ... 24 # 25
68%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable
X
.509 certificates [
3
] that automatically expire. You can
68%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
X
4 920 CPU (quad core) 8GB of memory (DDR2-800) The operating system and boot drive are on an IBM DTLA-307020 (
20
GB drive at Ultra ATA/100) /home is on a Seagate ST1360827AS A 64GB Intel
X
68%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
-address remotelan; 16 application any; 17 } 18 then { 19 permit;
20
} 21 }
22
} You need to define trustnet and remotelan in the zone address book because Juniper only processes
68%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
, most likely, (
3
/2)
x
15 seconds. Finally, -s defines the number of seconds to wait before sshguard "forgets" the attacker's IP address. The line sshguard -l /var/log/auth.log -s
20
instructs sshguard ...
3
67%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
qemu_
x
86_defconfigmake menuconfig (build-option, Kernel-Version
3
.2, gdb, tty1)makemake linux-menuconfig (debug info) make
3
. Compile the module and copy it to the root directory:cd driverexport CROSS
« Previous
1
2
3
4
5
6
Next »