search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(99)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
29%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
/2001/XMLSchema-instance" 05 xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-2.
0
.xsd 06 http
29%
pfSense firewall and router distribution
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
the Downloads page to a mirror, you might be overwhelmed by the list of innumerable files (Figure 1). Normally, however, all you need is the approximately 100
MB
ISO image, pfSense-2.
0
-RELEASE-i386.iso.gz, from
29%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of
0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size =
0
Mb
29%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
-host-alive' command definition 09 define command{ 10 command_name check-host-alive 11 command_line $USER1$/check_ping -H $HOSTADDRESS$ -w 3000.
0
,80% -c 5000.
0
,100% -p
12
5 13
29%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
processor cores. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000, including
12
months of free upgrades, news, and information. For server virtualization newcomers, Citrix
29%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
29%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
29%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.
0
-openjdk 02 # echo $JAVA
28%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
28%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
« Previous
1
2
3
4
5
6
7
8
9
10
Next »