search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(59)
Article
(14)
Blog post
(1)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
8
Next »
14%
Kernel and driver development for the Linux kernel
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
_string; 08
09
static int prochello_show( struct seq_file *m, void *v ) 10 { 11 int error = 0; 12 13 error = seq_printf( m, "%s\n", output_string); 14 return error; 15 } 16 17 static int prochello
14%
Distributed storage with Sheepdog
07.10.2014
Home
»
Archive
»
2014
»
Issue 23: 10 Ti...
»
/* 64 bit Fowler/Noll/Vo FNV-1a hash code */ 05 static inline uint64_t fnv_64a_buf(const void *buf, size_t len, uint64_t hval) 06 { 07 const unsigned char *p = (const unsigned char *) buf; 08
09
14%
A closer look at hard drives
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
buffered disk reads: 616
MB
in 3.00 seconds = 205.03
MB
/sec $ hdparm -T /dev/sda /dev/sda: Timing cached reads: 6292
MB
in 2.00 seconds = 3153.
09
MB
/sec If this were a spinning disk, you would also
14%
Bare metal deployment with OpenStack
02.08.2021
Home
»
Archive
»
2021
»
Issue 64: Bare...
»
_httpboot 03 local bifrost_ironic 04 local bifrost_mariadb 05 local bifrost_tftpboot 06 07 # ll -h /var/lib/docker/volumes/bifrost_httpboot/_data/ 08 [...]
09
-rw-r--r-- 1 42422 42422 6.1G Mar 2 10
14%
Exploring Ubuntu cloud tools
28.06.2011
Home
»
CloudAge
»
Articles
»
- 4B760828 emi- E0A3107A 192.168.1.101 172.19.1.3 pending mykeypair 0 m1.small 2011- 03-
09
T16:
22
:36.864Z cluster1 eki- F7111106 eri- 0B641162 04
14%
SHA-3 – The new hash standard
14.03.2013
Home
»
Archive
»
2013
»
Issue 13: IPv6...
»
family, by the names of SHA-224, SHA-
256
, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1. So
14%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home
»
Archive
»
2021
»
Issue 66: Inci...
»
:/usr/sbin:/bin/sh bin:x:
2:2
:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh (...) reboot; Connection closed by foreign host. Metasploitable runs many more insecure services that an Nmap scan brings to light (Listing 3
14%
Installing and operating the Graylog SIEM solution
13.12.2018
Home
»
Archive
»
2018
»
Issue 48: Secur...
»
. The pwgen command generates a password and encrypts with sh
256
sum: pwgen -N 1 -s 100 echo -n
| sha
256
sum The encrypted password is then assigned to the parameter root_password_sha2. Table 1 gives
14%
Setting up SSL connections on Apache 2
18.07.2013
Home
»
Archive
»
2013
»
Issue 15: What’...
»
cryptography), in which each party has two keys. To create a certificate, you must first generate a private key for the server: openssl genrsa -aes
256
-out privaterschluessel.pem 2048 The key length is 2048
14%
Automating development environments and deployment with Otto
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
] and unpack to your hard disk, revealing the lightweight otto program, which weighs in at just 15
MB
. Although you can call it directly – there is no need to install – HashiCorp does recommend adding otto
« Previous
1
2
3
4
5
6
7
8
Next »