search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(99)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
27%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
can exclude files of a certain size (e.g., those of
0
MB
). The Burp configuration language also provides two size parameters: min_file_size and max_file_size; for example: min_file_size =
0
Mb
27%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
environment, make sure the JAVA_HOME variable points to the Java root directory (Listing 1). Listing 1 Java Environment 01 # export JAVA_HOME=/usr/lib/jvm/jre-1.6.
0
-openjdk 02 # echo $JAVA
27%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
27%
Performance testing monitoring solutions
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512
MB
of RAM in the virtual
27%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
27%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
27%
Configuration management with Chef
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
server also requires Sun Java SDK version 1.6.
0
. Some distributions keep this package in an external or special repository. On Debian, you need to enable the non-free package source; on Ubuntu 10.04, you
27%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
--------- ------ ---- ----- ----
12
Throughput Cashier Customers
0
.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws
27%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
27%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
creates a 256
MB
file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
« Previous
1
2
3
4
5
6
7
8
9
10
Next »