search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(78)
Keywords
« Previous
1
2
3
4
5
6
7
8
Next »
43%
The Swiss Army knife of fault management
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
="walk" value="true"/>
22
23
24
25
43%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-
a
43%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
about the I/O performance on the guest systems, I was able to measure these speed hits on the HP system compared with the bare metal system. Installing a battery-buffered, 512
MB
write cache module vastly
43%
Maatkit tools for database administrators
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
of the stress test shown in Figure 2, shows that some 19,200 queries composed of 55 different commands were issued. The system, a server with 768
MB
of RAM and a Pentium 3 CPU, took a total of
22
seconds to answer
43%
VMware Server 2.0 on recent Linux distributions
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
/usr/lib/vmware/bin/vmware-hostd |awk '{print $3}'|grep lib | \ 19 xargs rpm --queryformat '%{NAME}\
n
' -qf |sort -u 20 glibc 21 libgcc
22
libstdc++ 23 libxml2 24 nss-softokn-freebl
25
zlib 26
43%
Expand your sphere with a piece of Google
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
="**/*.jar" /> 20 21
22
23 24
25
43%
Touring the top Knoppix debugging and rescue tools
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
23 echo -
n
-e "\rTrying $offset..." 24 if mount -o loop="$LOOP",ro,offset=$offset $DEV $MNT >>mount.log 2>&1 ; then
25
echo -e "\
n
Found a filesystem, now mounted on $MNT" 26 break 27 fi 28
43%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
depends on the liblzo
2-2
, libpkcs11-helper1, openssl-blacklist, and openvpn-blacklist packages. The next step is to set up your own Public Key Infrastructure (PKI). OpenVPN provides a software tool
43%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
22
23 24
25
26
27
43%
Monitoring KVM instances with Opsview
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
for the KVM host: Connectivity (LAN) Unix load RAM/Swap load Storage utilization SSH availability (typically on port
22
) Optional extensions: If you use libvirt, you can check
« Previous
1
2
3
4
5
6
7
8
Next »