search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm%253%25390 Llorente"22
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(105)
Keywords
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »
52%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
/** 16 * @param args 17 */ 18 public static void main(String[] args) throws Exception { 19 20 if (args.length !=
3
&& args.length != 5) 21 {
22
System
52%
Virus scanner and content filter with AD authentication
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
, and you need to modify slightly the script that was referred to previously, wbinfo_group.pl (Listing 2). Listing 2 wbinfo_group.pl 01 # Original: 02 03 # $user =~ s/%([0-
9
a-fA
-F][0-
9
a-fA-F])/pack("c
51%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:
c
3
:92:44:ba: 1
a
:df:d7:
9
c
:44:b
2:5
b:73:52:09. Are you sure you want to continue
51%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
version [
9
]. Listing
3
/etc/openvpn/ccd/John_Doe 01 # John Doe 02 ifconfig-push 192.168.1.
3
255.255.255.0 03 push "topology subnet" 04 push "redirect-gateway" 05 push "dhcp-option DNS 192
51%
Performance monitoring in Windows Server 2008 R2
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
magazine [6]. Infos PAL: http://pal.codeplex.com Log Parser
2.2
: http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4
c
25
-91b2-f8d975cf8
c
07&DisplayLang=en Office 2003 Add
51%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
existing backups, enter: burp -
a
l -b a Of course, more complex queries are also possible. For example, burp -
a
l -b
3
-r
lists all of the files in backup
3
that match the "regular
51%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
} 19 20 -re "($|%|>) " { interact } 21
22
timeout { 23 send_tty "No response from $host\
n
" 24 exit
25
} 26 } The script begins as usual by saving its arguments into variables
50%
Galera Cluster for MySQL
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
temporarily with Listing 5 Error Messages sh: /sbin/ifconfig: Permission denied 120405 8:29:02 [ERROR] WSREP: Failed to read output of: '/sbin/ifconfig | \ grep -m1 -1 -E '^[
a
-z]?eth[0-
9
50%
An IP-based load balancing solution
30.11.2025
Home
»
CloudAge
»
Articles
»
use_regex = 0
22
load_monitor = rup 23 scheduler = rr 24 protocol = tcp
25
timeout = 6 26 reentry = 15 27 quiesce_server = 1 28 server webserver1 { 29 address ...
3
50%
News
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
ranking the top
25
worst passwords in order of how commonly they are used. Here are the top ten: 1. password 2. 123456
3
. 12345678 4. qwerty 5. abc123 6. monkey 7. 1234567 8. letmein
9
. trustno1
« Previous
1
2
3
4
5
6
7
8
9
10
11
Next »