search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(99)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
27%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
.setContentType("text/plain"); 10 resp.getWriter().println("Hello World!"); 11 }
12
} Listing 2 Java web.xml for "Hello World!" 01 0" encoding="utf-8"?> 02
27%
Performance testing monitoring solutions
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
were run on a virtual system (using ESX as the hypervisor) with fixed reservations for CPU and memory. To be more precise, I used a virtual CPU running at 1.5GHz and with 512
MB
of RAM in the virtual
27%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40
MB
. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
27%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1
MB
) and simple
27%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
--------- ------ ---- ----- ----
12
Throughput Cashier Customers
0
.7500 Cust/Sec 13 Utilization Cashier Customers 75.0000 Percent 14 Queue Length Cashier Customers 3.0000 Cust 15 Residence Time Cashier Customers 4.0000 Sec 16 N Sws
27%
Overview of cloud platforms and appliances
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
Index for Various Providers Product Static IP Address (
0
.2) Software Appliances and Images Used (
0
.4) Web Storage (
0
.2) CDN (
0
.2) IPv6 (
0
.2) Pay As You Go
27%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
creates a 256
MB
file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area
26%
A simple approach to the OCFS2 cluster filesystem
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
of development, the programmers released version 1.
0
of OCFS2, and it made its way into the vanilla kernel (2.6.16) just a year later. Version
1.2
became more widespread, with a great deal of support from various
26%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
dh_group modp1024; 09 } 10 generate_policy off; 11 }
12
13 sainfo address 192.168.2.
0
/24 any address 172.16.
0.0
/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
26%
An IT nomad's diary
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
565b5901d666de3bfe538be27aebb9f443de98f
0
notification_proxy: use free() instead of g_free() 10 5c10f
12
e408b11afbd7c3cc93ddf7d85f1527417 ideviceinfo: fix possible segmentation fault when parsing empty
« Previous
1
2
3
4
5
6
7
8
9
10
Next »