search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(75)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
85%
From Out of the Blue
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
editor, grep, and a cross-referencer (either cscope [2] or LXR [
3
]). Although automated source code vulnerability scanners have their place, especially in auditing very large code bases, I haven'
t
found ...
3
85%
How Upstart boots Ubuntu-based systems
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
and
normally
resides in /sbin. In each case, Upstart first sends a SIGTERM signal to the job in question and then waits for the default five seconds. If the job is still running after this wait, Upstart
85%
Reading email in the browser with Horde
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
a product or to integrate Horde into their own solutions. User Settings Horde isn'
t
just flexible in terms of the server-side configuration but also offers users a number of settings. Compared with Horde
3
85%
Workshop: Getting web and mail servers ready for IPv6
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, such as ipv6.google.
com
. If one of these pings doesn'
t
work, check the server setup, including the default gateway and firewall configuration. Figure 2: ip -6
85%
Using AppLocker to block applications on networks
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
and implement your AppLocker policies [1]. And, Microsoft TechNet offers how-tos on the subject [2]. You can also check out WindowsSecurity.
com
[
3
] for a video that might help you set up your environment
85%
Virtualization with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
than 0 (Figure
3
). If not, either the processor doesn'
t
support the special commands, or the commands have been disabled in the computer's BIOS. Users with Intel processors can additionally check
85%
openlava – Hot resource manager
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
to pay attention to a few gotchas. (In my first attempt, I didn'
t
pay attention to these.) In the next sections, I'll walk through the installation of openlava on a cluster (the Warewulf-based cluster [
3
85%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
FA
3
DA769/656949ebook.pdf Google Apps for Business: http://www.google.
com
/apps/intl/en/business/index.html The Author Björn Bürstinghaus is a IT administrator with simyo GmbH in D
85%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
"-//Sun Microsystems, Inc.//DTD Web Application 2.
3
//EN" 04 "http://java.sun.
com
/dtd/web-app_2_
3
.dtd"> 05 06
07
08
84%
Professional backup solutions compared
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
of a previous full backup and the subsequent incremental backups. This synthetic backup is identical to a full backup but doesn'
t
entail repeatedly transferring data over the wire. VM backups could involve
« Previous
1
2
3
4
5
6
7
8
Next »