search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(68)
Article
(1)
Keywords
« Previous
1
2
3
4
5
6
7
Next »
28%
Dynamic routing in Linux with Quagga
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
doesn't handle the routing (that is still the domain of the underlying operating system kernel); however, it does provide a number of routing protocols – Routing Information Protocol (RIP) [
3
], RIPng [4
28%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
[
3
], a type of symbolic link on NTFS filesystems. On Unix systems, Burp can back up hardlinks, symlinks, fifos, and device nodes over the network, as well as files and directories. As of version 1
28%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
. Current enterprise solutions for the virtualization of servers and desktops [
3
] are all based on KVM. Setup and Software The example discussed in this article uses two physical nodes: host1 and host2
28%
Monitoring with Zabbix
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
(Figure
3
) expects an intuitive name. When you choose it, remember that the name will also be the subject line for the email sent when the trigger is tripped, as in, "Ping failed – host unreachable
28%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
which name server to use, or where the other network services are located. RFC 5006 [
3
] thus defines an extension to the router advertisements that lets the clients find the name server. Another important
28%
Connecting dissimilar IPsec implementations
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
expects as the PSK from the password of test123. I set the encryption algorithm for the first negotiation phase to
3
DES and the hash algorithm for authentication was SHA1. The setting for PFS was set
28%
Optimizing Hyper-V network settings
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
Version
3
.0 of Hyper-V in Windows Server 8 offers several improvements in terms of networking that improve the system's performance. Examples include direct access by virtual machines to the network
28%
Intelligent Stack
07.12.2025
Home
»
Articles
»
[1] openEuler Intelligence: https://www.openeuler.org/en/projects/intelligence/ [2] GMEM: https://www.openeuler.org/en/blog/G11
N
-SIG/20240116-memory-management/20240116-memory-management.html [
3
28%
Remote desktop based on HTML5
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
quickly view the password hash at the command line with the md5sum utility: # echo -
n
| md5sum -t 319f4d26e
3
c536b5dd871bb2c52e3178 - Next, add this hash value instead of the password
28%
Introduction to OpenMP programming
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
[
3
] to solving the questions. Although not the most efficient or fastest method for solving the problem, it does illustrate how one can use OpenMP to parallelize applications. I will be using
« Previous
1
2
3
4
5
6
7
Next »