search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(105)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »
54%
New Products
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
server development platforms, Calxeda unveiled its ARM-based "EnergyCore" server-on-
a
-chip (So
C
), which consumes as little as 1.5 watts – the industry's first server processor to achieve this milestone
54%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
="" 04 PING="ping -
c
1 -w
3
" 05 PING2="" 06 07 case $OS in 08 HP-UX*) 09 PING=ping 10 PING2="-
n
1" 11 RSH="remsh" 12 RSH2="-l user" 13 ;; 14 Sun
54%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
set remote-gw 192.168.1.31 06 set psksecret ENC kB+sdP4e109vAROdm
9
TRn
9
YIz
A
47T
3
JHPK4xVOzYu/8nc
3
wmqBknMZBzfHU7VRuWBF2gncDuHY1ubeCk
9
DU
3
zasHi61Izu0m6cg1cdERjgNmKKcO 07 set keepalive 600 08 next
53%
Intruder detection with tcpdump
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
, tcpdump [1] is deployed with libpcap (
a
C/C
++ library for network traffic capture) and maintained by the libpcap developers. With tcpdump, you can analyze large binary files that are too large to view
53%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
. Here are some examples: _{
3
,} – Three or more consecutive underscores · {
2,5
} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
53%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
18 19 # facts 20 factsource = yaml 21 plugin.yaml = /etc/mcollective/facts.yaml
22
23 # security plugin config 24 securityprovider = psk
25
plugin.psk = foobar Listing 4 /etc
53%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
/* connect {}: controls servers we connect to (OLD
C
:,
N
:, H:, L:) */ 02 connect "services.irc.hastexo.com" { 03 /* the name must go above */ 04 05 /* host: the host or IP to connect to
53%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
be replaced solely with the sshd configuration directives shown in Listing
3
. Line 16 specifies that SFTP will listen on port 2202 instead of the default SSH port
22
. This option is configurable and left ...
3
52%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="walk" value="true"/>
22
23
24
25
52%
The RADOS object store and Ceph filesystem
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
: mkcephfs -
a
-
c
/etc/ceph/ceph.conf -k /etc/ceph/admin.keyring Now you need to ensure that ceph.conf exists on all the hosts belonging to the cluster (Figure
3
). If this is the case, you just need to start ...
9
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »