search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 00 Llorente"5432
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(47)
Keywords
« Previous
1
2
3
4
5
Next »
26%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to
3
DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
26%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, the MAC address (e.g.,
00
:11:22:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
26%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
: 1487680 0 IO-APIC-fasteoi uhci_hcd:usb
3
14 22: 22998855 0 IO-APIC-fasteoi psb@pci:0000:
00
:02.0 15 23: 3084145 0 IO-APIC-fasteoi hda_intel 16 24: 1 0
26%
Moving HPC to the cloud
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
will provide sub-par performance. A deeper treatment of these issues can be found in a recent article called "Will HPC Work in the Cloud?" [
3
]. Finally, any remote computation scheme needs to address
26%
Find Entra ID vulnerabilities with AzureADRecon
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
ADRecon at
3
a.m. every night" $scriptPath = "C:\code\runazadrecon.ps1" # Path to the PowerShell script to be executed # Define triggers that execute the task $trigger = New-ScheduledTaskTrigger -Daily -At "03:
00
26%
Optimizing Hyper-V network settings
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Version
3
.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
26%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
26%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Model"; 11 $work = "ebiz-tx"; 12 $node1 = "WebServer"; 13 $node2 = "AppServer"; 14 $node
3
= "DBMServer"; 15 $think =
0.0
* 1e-
3
; # as per test system 16 $dtime = 2.2 * 1e-
3
; # dummy service time 17 18
26%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
.33 164.69 0.75 rand_mat_stat
3
.37 39.34 11.64 54.54 22.07 8.12 rand_mat_mul 1.
00
1.18 0.70 1.65 8
26%
Get the best out of your bandwidth with tc
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
protocol ip parent 1:0 prio 100 u32 match ip $DIR
5.4.3.2
flowid 1:14 06 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 4.
3
.2.1 flowid 1:14 Step Away from the Bandwidth I
« Previous
1
2
3
4
5
Next »