search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(113)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
...
12
Next »
20%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
$spin
08
@$molecule.xyz 09 10 END 11 12 done 13 done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
20%
Enterprise communication with IRC
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
. For other distros, the Ratbox source files are available at the project website [
3
]. After unzipping, you can install with the classic three-command trick of configure, make, and make install. That Ratbox
20%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.com/dtd/web-app_2_
3
.dtd"> 05 06
07
08
20%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
: Grocery Store Checkout *** 06 *** Ver: PDQ Analyzer v
3
.0 111904 *** 07 *************************************
08
****** RESOURCE Performance ******* 09 10 Metric Resource Work Value Unit 11
20%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
container. As its popularity increased and the server became more widespread, the JBoss community expanded and extended the product until, finally, application server version
3
(AS
3
) became a full
20%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
20%
Password protection with Phpass
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
a multiple layer strategy. It initially tries to use the far more secure Bcrypt [
3
], which in turn is based on the Blowfish method. If Bcrypt isn't available, Phpass uses the Extended DES method. And if you
20%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
-incremental:lanman passfile.txt 02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64]) 03 guesses: 0 time: 1:04:04:
08
(
3
) c/s: 10927 trying: gmugoky - gmugok2 04 guesses: 0 time: 1:09:25:10 (
3
20%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
filesystem using, for example: Listing 1 Makefile 01 ifneq ($(KERNELRELEASE),) 02 obj-m := hello.o 03 04 else 05 PWD := $(shell pwd) 06 KDIR := ~/buildroot-2011.
08
/output/build/linux-
3
.1/ 07
20%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
. Tokens and Certificates Of course, the VPN dial-up no longer uses a simple pre-shared key (PSK) but, instead, uses secure, centrally manageable X.509 certificates [
3
] that automatically expire. You can
« Previous
1
2
3
4
5
6
7
8
9
10
...
12
Next »