search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(99)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
29%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
/2001/XMLSchema-instance" 05 xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-2.
0
.xsd 06 http
29%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
the Downloads page to a mirror, you might be overwhelmed by the list of innumerable files (Figure 1). Normally, however, all you need is the approximately 100
MB
ISO image, pfSense-2.
0
-RELEASE-i386.iso.gz, from
29%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of
0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size =
0
Mb
29%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
-host-alive' command definition 09 define command{ 10 command_name check-host-alive 11 command_line $USER1$/check_ping -H $HOSTADDRESS$ -w 3000.
0
,80% -c 5000.
0
,100% -p
12
5 13
29%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
processor cores. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000, including
12
months of free upgrades, news, and information. For server virtualization newcomers, Citrix
29%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
29%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
29%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.
0
-openjdk 02 # echo $JAVA
29%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
28%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
« Previous
1
2
3
4
5
6
7
8
9
10
Next »