36%
09.01.2013
back ends), such as Google storage, Amazon S3, Amazon Reduced Redundancy Storage (RRS), OpenStack Swift, Rackspace Cloud Files, S3-compatible targets, local filesystems, and even filesystems accessed
36%
14.03.2013
to enable packet forwarding:
net.ipv4.ip_forward=1
Then, reboot to ensure that the new configuration is active.
iptables and Masquerading
Finally, you need to look at the firewall configuration
36%
30.11.2025
using a fixed key or X.509 certificates (new extensions with other approaches now also exist). In this phase, a hash and an encryption algorithm are chosen from a configured selection. Optionally
36%
20.08.2013
that it is available on all clients. The IM server can also access other systems on the Internet. For example, IceWarp supports ICQ, Google Talk, Yahoo, or Facebook chat. Administrators can define which networks
36%
15.04.2014
administration actually takes place on the RADIUS server. If you take on a new employee, you enter their account on the RADIUS server, WiFi access included.
Figure
36%
28.01.2014
, a variable uses keys, which can be of different types, to store a variety of values. In a table, neither the keys nor the values need to be of the same type. A new table is initialized in Lua with the curly
36%
26.11.2012
and wraps text when a new line is spotted, making those raw HTTP packets significantly easier to read with the human eye. It differentiates the packet headers and their associated payload nicely, too
36%
10.12.2012
a 32GB USB (or larger) drive or you purchase one new for this project matters little because you have to wipe it clean before use, so be sure Windows To Go is what you want on this drive before you start
36%
25.09.2013
's Tick-Tock processor model you can see that the "tick" is a die-shrink and the "tock" is a new processor design. During the tick, more cores are usually added, which gives more processing power but also
36%
22.08.2011
computer and enough time, no password can escape the hacker’s relentless attack. Time is important when cracking passwords because the hacker knows that once the victim discovers the compromise, new security