search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12%A9n Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(76)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
57%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
, the MAC address (e.g., 00:11:
22
:33:44:55) is split down the middle, and two bytes containing FF:FE are inserted. This gives you 64 bits. If the basis is a globally unique address (which should be the case
56%
Creating an SFTP jail
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
LD_LIBRARY_PATH=/usr/local/lib:/usr/local/include:/usr/local/lib/sparcv
9
05 PATH=/usr/local/bin:/usr/local/mysql:/usr/local/mysql/bin:/usr/local/sparc-sun-solaris2.10/bin:/usr/local/ssl:/usr/local/ssl
56%
SSH Administration – Windows in a Unix World
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
saved in /home/khess/.ssh/id_rsa.pub. 09 the key fingerprint is: 10 6d:2c:04:dd:bf:b2:de:e1:fc:52:e
9
:7f:59:10:98:bb khess@windows 11 The key's randomart image is:
12
+--[ RSA 2048]----+ 13 | .. . o
56%
Dispatches from the world of IT
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
on. Despite the mass appeal, Intel has pushed ahead with Itanium but has suffered the loss of support from Red Hat, Microsoft, and now Oracle. On March
22
, Oracle announced in a very terse statement
56%
Monitoring daemons with shell tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
#! /bin/sh 02 03 while true 04 do 05 06 zeit=$(date +%d.%m.%y\ %H:%M\ ) 07 08 psql -U monitor -d monitor -c "select * from watch;" 09 10 if [ $? -eq 2 ]; 11
12
then 13 14 echo "$time: Database
56%
Boost performance of your Python programs
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
understanding of parallel computing [1]. I used the Ubuntu
9
.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting
56%
Targeted defense against brute force attacks
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
-
N
sshguard The second command handles IPv6 packets. The next step is to extend the input chain so that network traffic is routed through the sshguard chain (Figure 2): sudo iptables -
A
INPUT -j
56%
Monitoring network computers with the Icinga Nagios fork
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
check_interval 5
12
retry_interval 1 13 contacts spz_admin 14 notification_period 24x7 15
56%
Fast system management from Puppet Labs
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
and Configuration The Puppet Labs website [
9
] offers various packages for RPM and Deb-based systems. To decide which package to install on which system, check out the following list of individual functionalities
56%
Virtualization via Zones
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
zonecfg:web1> add net 09 zonecfg:web1:net> set address=192.168.1.40/24 10 zonecfg:web1:net> set physical=e1000g1 11 zonecfg:web1:net> set defrouter=192.168.1.254
12
zonecfg:web1:net> end 13 zonecfg:web1
« Previous
1
2
3
4
5
6
7
8
Next »